Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing (computers that depend primarily on a central server for processing activities) and Internet cafes. CryptoGraphics explores the potential for implementing ciphers within graphics processing units (GPUs). A prototype application involving streaming video and GPU-based encryption ...
Read More
Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing (computers that depend primarily on a central server for processing activities) and Internet cafes. CryptoGraphics explores the potential for implementing ciphers within graphics processing units (GPUs). A prototype application involving streaming video and GPU-based encryption and decryption is also described, illustrating the benefits and issues of running a cipher within a GPU. By enabling encryption and decryption in a GPU, unencrypted display data can be confined to the GPU to avoid exposing it to any malware running on the operating system.
Read Less
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £95.23, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2010 by Springer.
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £99.43, like new condition, Sold by GreatBookPrices rated 4.0 out of 5 stars, ships from Columbia, MD, UNITED STATES, published 2010 by Springer.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 140 p. Contains: Illustrations, black & white. Advances in Information Security, 20. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £99.44, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2006 by Springer.
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £101.85, like new condition, Sold by GreatBookPrices rated 4.0 out of 5 stars, ships from Columbia, MD, UNITED STATES, published 2006 by Springer.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Glued binding. Paper over boards. 140 p. Contains: Unspecified, Illustrations, black & white. Advances in Information Security, 20. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £103.79, like new condition, Sold by GreatBookPricesUK5 rated 4.0 out of 5 stars, ships from Castle Donington, DERBYSHIRE, UNITED KINGDOM, published 2010 by Springer.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Trade paperback (US). Glued binding. 140 p. Contains: Illustrations, black & white. Advances in Information Security, 20. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.
Add this copy of Cryptographics: Exploiting Graphics Cards for Security to cart. £108.37, like new condition, Sold by GreatBookPricesUK5 rated 4.0 out of 5 stars, ships from Castle Donington, DERBYSHIRE, UNITED KINGDOM, published 2006 by Springer.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Fine. Glued binding. Paper over boards. 140 p. Contains: Unspecified, Illustrations, black & white. Advances in Information Security, 20. In Stock. 100% Money Back Guarantee. Brand New, Perfect Condition, allow 4-14 business days for standard shipping. To Alaska, Hawaii, U.S. protectorate, P.O. box, and APO/FPO addresses allow 4-28 business days for Standard shipping. No expedited shipping. All orders placed with expedited shipping will be cancelled. Over 3, 000, 000 happy customers.