找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: CryptoGraphics; Exploiting Graphics Debra L. Cook,Angelos D. Keromytis Book 2006 Springer-Verlag US 2006 Internet.encryption.monitor.opera

[复制链接]
查看: 48162|回复: 35
发表于 2025-3-21 18:57:45 | 显示全部楼层 |阅读模式
书目名称CryptoGraphics
副标题Exploiting Graphics
编辑Debra L. Cook,Angelos D. Keromytis
视频videohttp://file.papertrans.cn/241/240528/240528.mp4
概述Describes unique approach for disabling spyware.Explores the use of a Graphics Processing Unit (GPU) as a trusted system component.Provides a detailed description and code for a GPU-based implementati
丛书名称Advances in Information Security
图书封面Titlebook: CryptoGraphics; Exploiting Graphics  Debra L. Cook,Angelos D. Keromytis Book 2006 Springer-Verlag US 2006 Internet.encryption.monitor.opera
描述.Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes...CryptoGraphics: Exploiting Graphics Cards for Security. explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs for general purpose computing has arisen. This work extends such research by considering the use of a GPU as a parallel processor for encrypting data. The authors evaluate the operations found in symmetric and asymmetric key ciphers to determine if encryption can be programmed in existing GPUs. A detailed description for a GPU based implementation of AES is provided. The feasibility of GPU-based encryption allows the authors to explore the use of a GPU as a trusted system component. Unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system..
出版日期Book 2006
关键词Internet; encryption; monitor; operating system; security; symmetric key; data structures
版次1
doihttps://doi.org/10.1007/0-387-34189-7
isbn_softcover978-1-4419-3964-7
isbn_ebook978-0-387-34189-7Series ISSN 1568-2633 Series E-ISSN 2512-2193
issn_series 1568-2633
copyrightSpringer-Verlag US 2006
The information of publication is updating

书目名称CryptoGraphics影响因子(影响力)




书目名称CryptoGraphics影响因子(影响力)学科排名




书目名称CryptoGraphics网络公开度




书目名称CryptoGraphics网络公开度学科排名




书目名称CryptoGraphics被引频次




书目名称CryptoGraphics被引频次学科排名




书目名称CryptoGraphics年度引用




书目名称CryptoGraphics年度引用学科排名




书目名称CryptoGraphics读者反馈




书目名称CryptoGraphics读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:33:44 | 显示全部楼层
发表于 2025-3-22 01:37:05 | 显示全部楼层
CryptoGraphics978-0-387-34189-7Series ISSN 1568-2633 Series E-ISSN 2512-2193
发表于 2025-3-22 05:14:50 | 显示全部楼层
发表于 2025-3-22 09:44:35 | 显示全部楼层
https://doi.org/10.1007/0-387-34189-7Internet; encryption; monitor; operating system; security; symmetric key; data structures
发表于 2025-3-22 16:42:31 | 显示全部楼层
发表于 2025-3-22 17:49:30 | 显示全部楼层
Debra L. Cook,Angelos D. KeromytisDescribes unique approach for disabling spyware.Explores the use of a Graphics Processing Unit (GPU) as a trusted system component.Provides a detailed description and code for a GPU-based implementati
发表于 2025-3-22 23:19:29 | 显示全部楼层
Advances in Information Securityhttp://image.papertrans.cn/d/image/240528.jpg
发表于 2025-3-23 03:31:45 | 显示全部楼层
发表于 2025-3-23 07:44:43 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-19 00:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表