Who has the keys to the vault? Protecting secrets on Laptops | IEEE Conference Publication | IEEE Xplore