Movatterモバイル変換


[0]ホーム

URL:


Zadka, 2019 - Google Patents

Cryptography

Zadka, 2019

Document ID
10085826337609858232
Author
Zadka M
Publication year
Publication venue
DevOps in Python: Infrastructure as Python

External Links

Snippet

Cryptography is a necessary component in many parts of secure architecture. However, just adding cryptography to the code does not make it more secure; care must be given to such topics as secrets generation, secrets storage, and plain-text management. Properly …
Continue reading atlink.springer.com (other versions)

Similar Documents

PublicationPublication DateTitle
CN111095256B (en)Securely executing smart contract operations in a trusted execution environment
US12355864B1 (en)Trust framework against systematic cryptographic breach
TWI709314B (en) Data processing method and device
LozuponeAnalyze encryption and public key infrastructure (PKI)
RU2718689C2 (en)Confidential communication control
JP6528008B2 (en) Personal Device Security Using Elliptic Curve Cryptography for Secret Sharing
US10805087B1 (en)Code signing method and system
CN102577229B (en)Key certification in one round trip
US8527769B2 (en)Secure messaging with read-undeniability and deletion-verifiability
Zhou et al.EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts
WO2018045568A1 (en)Access control method oriented to cloud storage service platform and system thereof
Garg et al.Comparative analysis of cloud data integrity auditing protocols
CN106341236A (en)Access control method facing cloud storage service platform and system thereof
Hussein et al.A survey of cryptography cloud storage techniques
Diomedous et al.Practical password hardening based on TLS
CN107360252A (en)A kind of Data Access Security method that isomery cloud domain authorizes
Purushothama et al.Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
ZadkaCryptography
JP7385025B2 (en) Execution of Entity-Specific Cryptographic Code in a Cryptographic Coprocessor
ParkSecurity requirements for multimedia archives
Soman et al.Analysis of hybrid data security algorithms for cloud
Arvin S. Lat et al.SOUL System: secure online USB login system
EasttomSSL/TLS
Shah et al.Third party public auditing scheme for security in cloud storage
Reddy et al.Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques

[8]ページ先頭

©2009-2025 Movatter.jp