Key Management and Protection: Evaluation of Hardware, Tokens, TEEs and MPC
Nigel Smart, Professor, KU Leuven One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptog...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
Nigel Smart, Professor, KU Leuven
One of the pillars of cryptography implementation is the secure storage and management of the keys used to perform cryptographic operations. This session will review the varied cryptographic key management and protection technologies available today, including new emerging solutions designed to enhance security and usability in a dispersed, connected digital IT environment.Learning Objectives:1: Review the varied cryptographic key management and protection technologies available today.2: Discuss key criteria for evaluating the security strength of key protection mechanisms.3: Provide a security and usability assessment of key protection models.Pre-Requisites:Basic knowledge of cryptography/key management.
Video Information
Views
946
Total views since publication
Likes
8
User likes and reactions
Duration
49:48
Video length
Published
Mar 8, 2019
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#rsaconference #rsac #cryptography #infosec #Protecting Data & Applied Crypto #infrastructure security #information #security #cybersecurity #security architecture #key management #rsa #encryption strategy & trends
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.