Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
untrusted cloud providers
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 10:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl