Applying Cryptography as a Service to Mobile Applications

  • Friday, February 28, 2014 | 10:20 AM – 11:20 AM | West | Room: 2002

View all Sessions

Deploying cryptographic keys on vulnerable end points such as mobile phones is risky. This presentation proposes a Cryptography as a Service (CaaS) model which allows operations to be performed without exposing cryptographic keys and recommends how to overcome the many pitfalls associated with this technology. How CaaS can be used to secure data in flight, data at rest in the Public Cloud and data at rest on the phone are reviewed.


This document was retrieved from on Thu, 27 Jun 2019 05:07:52 -0400.