The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.14)
pp: 84-87
Stephen Farrell , Trinity College Dublin
ABSTRACT
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.
INDEX TERMS
application layer crypto, confidentiality, object security, Internet
CITATION
Stephen Farrell, "Applications Directly Using Cryptography", IEEE Internet Computing, vol.14, no. 3, pp. 84-87, May/June 2010, doi:10.1109/MIC.2010.62
REFERENCES
1. M. Bond and R. Anderson, "API-Level Attacks on Embedded Systems," Computer, vol. 34, no. 10, 2001, pp. 67–75.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool