Login / Signup
A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Fatma Mohamed
Bushra AlBelooshi
Khaled Salah
Chan Yeob Yeun
Ernesto Damiani
Published in:
FAS*W@SASO/ICCAC (2017)
Keyphrases
</>
hash functions
cloud computing
secret key
smart card
key management
access control
encryption scheme
secure communication
virtual machine
data center
similarity search
data sets
privacy preservation
map reduce
ciphertext
security properties
encryption key