<--- Back to Details
First PageDocument Content
Web services / Cryptographic hash functions / Amazon Elastic Compute Cloud / Cloud infrastructure / Infrastructure as a Service / Key management / SHA-2 / Key size / SHA-1 / Cloud computing / Cryptography / Computing
Date: 2012-05-17 09:04:41
Web services
Cryptographic hash functions
Amazon Elastic Compute Cloud
Cloud infrastructure
Infrastructure as a Service
Key management
SHA-2
Key size
SHA-1
Cloud computing
Cryptography
Computing

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 332,16 KB

Share Document on Facebook

Similar Documents

Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Fredrick Dande, MBA, PMP

DocID: 1ul8D - View Document

Docker Overview Enterprise Containers-as-a-Service Platform IT organizations are under pressure to modernize for the digital era, but are constrained by having multiple infrastructure and technology stacks to maintain. D

DocID: 1tBC6 - View Document

PERFORMANCE STUDY OF MAKING IDSS SELF-ADAPTABLE IN IAAS CLOUDS CHRISTINE MORIN, ANNA GIANNAKOU, LOUIS RILLING MYRIADS TEAM Infrastructure as a Service (IaaS) clouds use virtualisation to allow tenants to

DocID: 1rIGk - View Document

Computing / Cloud computing / Cloud infrastructure / OpenStack / Adyar /  Chennai / Platform as a service / Cloud storage / HP Cloud / Cloud research

CLOUD COMPUTING COURSE CONTENT Introduction - Cloud Computing ● What is meant by cloud computing

DocID: 1rrjj - View Document

Computing / Cloud computing / Cloud infrastructure / Cloud storage / As a service / Platform as a service / Cloud Foundry / IBM cloud computing / HP Cloud

Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas October, 2015 The Cloud Standards Customer Council

DocID: 1rplK - View Document