共 50 条
- [1] Management of Symmetric Cryptographic Keys in Cloud Based Environment [J]. 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 39 - 44
- [4] Securing Cryptographic Keys in the Cloud: A Survey [J]. IEEE CLOUD COMPUTING, 2016, 3 (04): : 42 - +
- [5] Docurity: A New Cryptographic Primitive for Collaborative Cloud Systems [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3725 - 3742
- [6] Security of biased sources for cryptographic keys [J]. CRYPTOGRAPHY AND COMPUTATIONAL NUMBER THEORY, 2001, 20 : 287 - 302
- [8] Securing Cryptographic Keys in the IaaS Cloud Model [J]. 2015 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC), 2015, : 397 - 401
- [9] A Scattering Technique for Protecting Cryptographic Keys in the Cloud [J]. 2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 301 - 306
- [10] Direct visualization of cryptographic keys for enhanced security [J]. VISUAL COMPUTER, 2018, 34 (12): : 1749 - 1759