Encryption Proxies in a Confidential Computing Environment.
Mohamad Jamil Al BouhairiMostakim MullickMarvin WolfIvan GudymenkoSebastian ClaussPublished in: UbiSec (2022)
Keyphrases
- computing environments
- original data
- encryption algorithms
- numerical data
- mobile agents
- confidential information
- mobile computing
- image encryption
- pervasive computing
- encryption scheme
- pervasive computing environments
- trusted computing
- statistical databases
- sensitive data
- trust management
- grid computing
- service discovery
- context awareness
- key management
- security analysis
- encryption algorithm
- information loss
- distributed computing environment
- lightweight
- cooperative