Fig. 5From: Secure user authentication based on the trusted platform for mobile devicesScreenshots of the user authentication in TMZ systemBack to article page