Cryptography as a Service

  • Thursday, October 31, 2013 | 10:00 – 10:50 | Room: G107

View all Sessions

Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when keys are deployed to end points such as electricity meters and mobile phones. This presentation proposes a Cryptography as a service model which allows operations to be performed without exposing cryptographic keys, recommending how to overcome the many pitfalls associated with this technology.


This document was retrieved from on Fri, 29 Apr 2016 15:45:53 -0400.
© 2016 EMC Corporation. All rights reserved.