Client-controlled Cryptography-as-a-Service in the Cloud

Embed Size (px)

DESCRIPTION

Cryptography: #tags Access Control, Affine Cipher,Annualised Loss, Asset, Authentication, Autokey, Authorization, Backup, BAN Logic, Baseline Control, Biometric, Bit Commitment, Block Cipher, BlowFish, Business Continuity, Cipher, Ciphertext, Cold Standby, Code, Codebook, Codebreaker, Collision, Collision Resistance, Confidentiality, Control, Copyright, Countermeasure, Cryptanalysis, Cryptography, Decrypt, Denial of Service, Dictionary Attack, Digital Signature, Disaster Recovery, Discrete Log, Eavesdrop, Email, Encipher, End-to-End Security, Error Extension, Exclusive-OR, Extreme Cipher, Facsimile, Fingerprint, Frequency Hopping, Hash function, Hot Standby, Insider, Insurance, Integrity, Internet, IT Security, Key, Key Exchange, Key Management, Keystream, Known Ciphertext Attack, Known Plaintext Attack, Law of Large Numbers, Law of Small Numbers, Law of Medium-Sized Numbers, MAC, Meet in the Middle, Message Digest, Minimum Disclosure Proof, Network, Nonce, Normal Distribution, Notary, NP-Hard, Number, One Time Pad, Password, PC Security, PIN, Plaintext, Protocol, Provably Secure, Public Key, Random Number, Redundancy, Risk Analysis, Risk Management, RSA, Secret, Secret Key, Secret-Sharing, Security, Security Breeches, Security Policy, Session Key, Smart Card, Smooth Number, Square-Free, Standard, Standby, Steganography, Stream Cipher, Strict Avalanche Criterion, Strong Cipher, Symmetric, Asymmetric Cipher, System, Top Secret, Traffic Analysis, Trapdoor, Trusted Kernel, Two Time Pad, Turing Machine, Unbreakable, Unicity, Universal Hash Functions, UPS, Virus, Watermark, Weak Cipher, Week Key, Wiretap, Worm, Zero-Defect, Zero-Knowledge Argument, Zero-Knowledge Proof