Secure cryptographic functions via virtualization-based outsourced computing.
Weizhong QiangKang ZhangWeiqi DaiHai JinPublished in: Concurr. Comput. Pract. Exp. (2016)
Keyphrases
- encryption key
- security protocols
- third party
- smart card
- encryption scheme
- cryptographic protocols
- key management
- cloud computing
- virtual machine
- public key encryption
- operating system
- security mechanisms
- security requirements
- digital signature
- security properties
- secure communication
- cryptographic algorithms
- high availability
- standard model
- input output
- authentication scheme
- ibm zenterprise
- lightweight