Proceedings of the Second Workshop on Cryptography and Security in Computing Systems, CS2@HiPEAC 2015, Amsterdam, Netherlands, January 19-21, 2015
Published in: CS2@HiPEAC (2015)
Keyphrases
- computing systems
- information security
- computer systems
- encryption algorithms
- academia and industry
- ubiquitous computing environments
- computing technologies
- parallel computing
- network security
- security issues
- security requirements
- computer science
- access control
- intrusion detection
- computing platform
- security policies
- autonomic computing
- high performance computing
- autonomic computing systems
- public key cryptography
- database
- high end
- key management
- smart card
- operating system
- artificial intelligence