Login / Signup

Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.

Arseny KurnikovAndrew PaverdMohammad MannanN. Asokan
Published in: ARES (2018)
Keyphrases
  • access control
  • hash functions
  • read write
  • hand held devices
  • smart card
  • cloud computing
  • databases
  • information access
  • security protocols
  • cryptographic protocols