ROCKY: Rotation Countermeasure for the Protection of Keys and Other Sensitive Data.
Konstantina MiteloudiLejla BatinaJoan DaemenNele MentensPublished in: SAMOS (2021)
Keyphrases
- sensitive data
- information security
- protection mechanisms
- data confidentiality
- smart card
- privacy protection
- information systems
- secret key
- intrusion detection
- data protection
- privacy preservation
- malicious users
- data privacy
- personal data
- confidential data
- security requirements
- privacy preserving
- encrypted data
- data storage
- data security
- sensitive information
- e government
- peer to peer
- databases