Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
Debra L. CookRicardo A. BarattoAngelos D. KeromytisPublished in: ICICS (2005)
Keyphrases
- real time
- remote access
- data acquisition
- remote server
- password authentication
- sensitive data
- access control
- low cost
- unauthorized access
- live video
- security policies
- hardware and software
- third party
- secure information sharing
- computing systems
- user authentication
- hardware implementation
- massively parallel
- random access
- memory access
- network access
- central processor
- privacy preserving