Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs...
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult...
Constitutes the proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, held in New York, NY, USA in June 2005. This book covers topics such as: authentication, key exchange protocols, network denial of service, digital signatures, public key cryptography, MACs, forensics, and intrusion detection.
Constitutes the proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, held in New York, NY, USA i...
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs...
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult...
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC 2012), held in Kralendijk, Bonaire, February 27-March 1, 2012. The 29 revised full papers presented were carefully selected and reviewed from 88 submissions. The papers cover all aspects of securing transactions and systems, including information assurance in the context of finance and commerce.
This book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Financial Cryptography and Data Secu...