-
1
-
-
33646724439
-
Authentication and delegation with smart-cards
-
M. Abadi, M. Burrows, C. Kaufman, B. Lampson, Authentication and Delegation with Smart-cards, Theoretical Aspects of Computer Software, 1991.
-
(1991)
Theoretical Aspects of Computer Software
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
33646731949
-
Remotely keyed cryptographics - Secure remote display access using (mostly) untrusted hardware (extended version)
-
D. Cook, R. Baratto and A. Keromytis, Remotely Keyed Cryptographics - Secure Remote Display Access Using (Mostly) Untrusted Hardware (Extended Version), Columbia Univeristy Computer Science Technical Report CUCS 050-04, 2004.
-
(2004)
Columbia Univeristy Computer Science Technical Report
, vol.CUCS 050-04
-
-
Cook, D.1
Baratto, R.2
Keromytis, A.3
-
4
-
-
24144454572
-
CryptoGraphics: Secret key cryptography using graphics cards
-
LNCS 3376, Springer-Verlag
-
D. Cook, J. Ioannidis, A. Keromytis and J. Luck, CryptoGraphics: Secret Key Cryptography Using Graphics Cards, RSA Conference, Cryptographer's Track (CT-RSA), LNCS 3376, Springer-Verlag, pages 334-350, 2005.
-
(2005)
RSA Conference, Cryptographer's Track (CT-RSA)
, pp. 334-350
-
-
Cook, D.1
Ioannidis, J.2
Keromytis, A.3
Luck, J.4
-
6
-
-
0005097206
-
Digital Rights Management (DRM) architectures
-
June
-
R. Iannella, Digital Rights Management (DRM) Architectures, D-Lib Magazine, http://www.dlib.org/dlib/june01/iannella/06iannella.html vol. 7 (6), June, 2001.
-
(2001)
D-lib Magazine
, vol.7
, Issue.6
-
-
Iannella, R.1
-
7
-
-
0005377968
-
-
Ziff-Davis, Inc
-
i-Bench version 1.5, Ziff-Davis, Inc, http://www.veritest.com/benchmarks/ i-bench/.
-
I-Bench Version 1.5
-
-
-
8
-
-
12844288855
-
Protected interactive 3D graphics via remote rendering
-
D. Koller, M. Turitzin, M. Levoy, M. Tarini, G. Croccia and P. Cignoni and R. Scopigno, Protected Interactive 3D Graphics Via Remote Rendering, ACM SIGGRAPH, 2004.
-
(2004)
ACM SIGGRAPH
-
-
Koller, D.1
Turitzin, M.2
Levoy, M.3
Tarini, M.4
Croccia, G.5
Cignoni, P.6
Scopigno, R.7
-
9
-
-
10944240574
-
Interface illusions
-
E. Levy, Interface Illusions, IEEE Security & Privacy, vol. 2 (6), 2004, pages 66-69.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.6
, pp. 66-69
-
-
Levy, E.1
-
11
-
-
2442545605
-
Measuring thin-client performance using slow-motion benchmarking
-
J. Nieh, S. Jae Yang and N. Novik, Measuring Thin-Client Performance Using Slow-Motion Benchmarking, ACM Transactions on Computer Systems, vol. 21 (1), pages 87-115, 2003.
-
(2003)
ACM Transactions on Computer Systems
, vol.21
, Issue.1
, pp. 87-115
-
-
Nieh, J.1
Yang, S.J.2
Novik, N.3
-
12
-
-
33646724658
-
-
OpenGL Organization, http://www.opengl.org.
-
-
-
-
15
-
-
20844455974
-
Challenges in securing voice over IP
-
May/June
-
T. J. Walsh and D. R. Kuhn, Challenges in Securing Voice over IP, IEEE Security & Privacy Magazine, vol. 3 (3), May/June 2005, pages 44-49.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 44-49
-
-
Walsh, T.J.1
Kuhn, D.R.2
-
16
-
-
0003651470
-
-
Addison-Wesley, Reading, MA
-
M. Woo, J. Neider, T. Davis and D. Shreiner, The OpenGL Programming Guide, 3rd edition, Addison-Wesley, Reading, MA, 1999.
-
(1999)
The OpenGL Programming Guide, 3rd Edition
-
-
Woo, M.1
Neider, J.2
Davis, T.3
Shreiner, D.4
|