Cloud Encryption Handbook: Schemes, Strengths and Weaknesses

As you increase encryption strength, you often sacrifice application functionality. Co-authored by Georgia Tech's Alexandra Boldyreva, Cryptology Ph.D, the guide reviews encryption/functionality trade-offs and a framework for selecting the right scheme.
Skyhigh Networks | Applications
©1994-2014 Infoworld, Inc.