Cloud Encryption Handbook: Schemes, Strengths and Weaknesses

As you increase encryption strength, you often sacrifice application functionality. Co-authored by Georgia Tech's Alexandra Boldyreva, Cryptology Ph.D, the guide reviews encryption/functionality trade-offs and a framework for selecting the right scheme.

Sponsor: Skyhigh Networks