Login / Signup
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Arseny Kurnikov
Andrew Paverd
Mohammad Mannan
N. Asokan
Published in:
ARES (2018)
Keyphrases
</>
access control
hash functions
read write
hand held devices
smart card
cloud computing
databases
information access
security protocols
cryptographic protocols