Cryptography as a Service

  • Thursday, October 31, 2013 | 10:00 – 10:50 | Room: G107
View all Sessions

Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when keys are deployed to end points such as electricity meters and mobile phones. This presentation proposes a Cryptography as a service model which allows operations to be performed without exposing cryptographic keys, recommending how to overcome the many pitfalls associated with this technology.


This document was retrieved from on Wed, 04 Mar 2015 06:18:18 -0500.
© 2015 EMC Corporation. All rights reserved.