Publisher
Springer International Publishing
Reference27 articles.
1. Global Encryption Trends Study. Ponemon Institute Research Report (2020)
2. Sinha, V.S., et al.: Detecting and mitigating secret-key leaks in source code repositories. In: 12th Working Conference on Mining Software Repositories (MSR), Florence, pp. 396–400. IEEE/ACM (2015)
3. Lecture Notes in Computer Science;M Björkqvist,2010
4. Selecting the right key management system. Cryptomathic White Paper (2019)
5. Attridge, J.: An Overview of Hardware Security Modules. SANS Institute. Information Security Reading Room (2002)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Pragmatic Analysis of Key Management for Cryptocurrency Custodians;2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC);2024-05-27
2. Data Logistics Service in eFlows4HPC;2024 47th MIPRO ICT and Electronics Convention (MIPRO);2024-05-20
3. Key Generation using Curve Fitting for Polynomial based Cryptography;2023 7th International Conference on Trends in Electronics and Informatics (ICOEI);2023-04-11
4. Encryption Algorithms in IoT: Security vs Lifetime;SSRN Electronic Journal;2023