Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Department of Computer Science, Columbia University
Information and Communications Security, Lecture Notes in Computer Science, 2005, Volume 3783/2005, 363-375
@article{cook2005remotely,
title={Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware},
author={Cook, D. and Baratto, R. and Keromytis, A.},
journal={Information and Communications Security},
pages={363–375},
year={2005},
publisher={Springer}
}
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker, or even by the owner of a system to spy on other users of the system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet.
December 13, 2010 by hgpu
Your response
You must be logged in to post a comment.