Login / Signup
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials.
Arseny Kurnikov
Andrew Paverd
Mohammad Mannan
N. Asokan
Published in:
CoRR (2018)
Keyphrases
</>
access control
hash functions
hand held devices
smart card
secret key
cloud computing
data sets
random access
access control policies
remote server
mobile devices
neural network
network security
information access
security policies
cryptographic protocols
read write
content adaptation
database