![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Software Service Recommendation Base on Collaborative Filtering Neural Network Model
With broad application of Web service technology, many users look for applicable Web services to construct their target application quickly or do some further research. Github, as a treasury including a variet...
-
Chapter and Conference Paper
High-Performance Symmetric Cryptography Server with GPU Acceleration
With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these pr...
-
Chapter and Conference Paper
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation
Nowadays graphics processing units (GPUs) have become popular parallel computing platforms known as General-Purpose GPU (GPGPU) computing. GPUs thereby are chosen by some security researchers as cryptographic ...
-
Chapter and Conference Paper
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA
Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...
-
Chapter and Conference Paper
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks
Memory disclosure attacks, such as cold-boot attacks and DMA attacks, allow attackers to access all memory contents, therefore introduce great threats to plaintext sensitive data in memory. Register-based and ...