The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2010 vol. 14)
ISSN: 1089-7801
pp: 84-87
Stephen Farrell , Trinity College Dublin
Sometimes, we need to use cryptographic protection from application layer code. Although requirements for this don't arise that often, when they do, they tend to be met in homegrown, ad hoc ways, and frequently without considering how to best use cryptographic APIs or do key management. In this article, the author considers how to do somewhat better than that.
application layer crypto, confidentiality, object security, Internet
Stephen Farrell, "Applications Directly Using Cryptography", IEEE Internet Computing, vol. 14, no. , pp. 84-87, May/June 2010, doi:10.1109/MIC.2010.62
108 ms
(Ver )