Главная
Study mode:
on
1
Introduction
2
Searchable Encryption
3
Systemwide Security
4
Swissa
5
Summary
6
JWT
7
How JWT works
8
Weaknesses
9
All Keys
10
Pieces
11
Questions
12
Vulnerability discovery
13
Key metadata
14
Cloud storage systems
Description:
Explore the intersection of cryptography and cloud computing in this 47-minute conference talk. Delve into topics such as searchable encryption, systemwide security, and the Swiss Army knife of cryptography. Gain insights into JSON Web Tokens (JWT), including their functionality and potential vulnerabilities. Examine cloud storage systems, key metadata, and the process of vulnerability discovery. Learn about the various components that contribute to secure cloud infrastructure and the challenges faced in maintaining data privacy and integrity in cloud environments.

Crypto for the Cloud

TheIACR
Add to list
0:00 / 0:00