Login / Signup
Securing Cryptographic Keys in the IaaS Cloud Model.
Bushra AlBelooshi
Khaled Salah
Thomas Martin
Ernesto Damiani
Published in:
UCC (2015)
Keyphrases
</>
cloud model
hash functions
cloud computing
smart card
high assurance
secret key
identity management
data center
key management
security protocols
similarity search
information security
secure communication
encryption key
random number generator
virtual machine
databases
encryption scheme
data management