Cryptography as a Service

  • Thursday, October 31, 2013 | 10.00 – 10.50 hrs | Room: G107

View all Sessions

Deploying cryptographic keys on vulnerable VMs in the Cloud is risky. Similar risks exist when keys are deployed to end points such as electricity meters and mobile phones. This presentation proposes a Cryptography as a service model which allows operations to be performed without exposing cryptographic keys, recommending how to overcome the many pitfalls associated with this technology.


This document was retrieved from on Thu, 18 Jul 2019 07:37:59 -0400.