Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

untrusted cloud providers

biblio

Visible to the public A Scattering Technique for Protecting Cryptographic Keys in the Cloud

Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
  • cryptographic keys protection
  • on-demand computing
  • Memory Protection
  • key-scattering approach
  • key extraction tools
  • encryption
  • encrypted data
  • Data Analytics
  • data analysis
  • private key cryptography
  • Cloud Security
  • Cloud Computing
  • business critical-data
  • brute force attacks
  • Big Data
  • AES cryptographic keys
  • advanced encryption standard
  • scattering technique
  • VMs
  • VM random access memory
  • virtual machines
  • untrusted cloud providers
  • storage capabilities
  • standards
  • standard AES algorithm
  • Secure Cryptographic Keys
  • widely used computing paradigm
  • Scattering
  • Resilient Security Architectures
  • Resiliency
  • random-access storage
  • Random access memory
  • RAM
  • pubcrawl

Terms of Use  |  ©2023. CPS-VO