Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware

Debra L. Cook, Ricardo Baratto, Angelos D. Keromytis
Department of Computer Science, Columbia University
Information and Communications Security, Lecture Notes in Computer Science, 2005, Volume 3783/2005, 363-375


   title={Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware},

   author={Cook, D. and Baratto, R. and Keromytis, A.},

   journal={Information and Communications Security},





Download Download (PDF)   View View   Source Source   



Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. Such software may be inadvertently installed by a user that is casually browsing the web, or may be purposely installed by an attacker, or even by the owner of a system to spy on other users of the system. This is particularly problematic in the case of utility computing, early manifestations of which are Internet.
No votes yet.
Please wait...

* * *

* * *

HGPU group © 2010-2023 hgpu.org

All rights belong to the respective authors

Contact us: