| Document Date: 2006-08-07 14:09:37 Open Document File Size: 484,00 KBShare Result on Facebook
Company IBM / Microsoft / / / Event Natural Disaster / Man-Made Disaster / / Facility US Prison / Information Science University of Pennsylvania / / IndustryTerm covert network / digital input device / crypto systems / crypto algorithm / typical general purpose computing systems / less interactive network applications / Internet Destination Receiver / network computing applications / interactive network applications / web browsers / software-based network / hardware device / software trojan / input devices / coupled network / manufacturing process / input device / keylogger device / mix networks / software vulnerability / Internet Add Jitters JitterBug Sender Look / conventional computer systems / relay device / above applications / application software / cryptographic algorithms / usable and practical network / interactive network software / host software / external network / malicious covert network / web camera / attack tool / compromised input device / hardware interception device / e.g. software / / NaturalFeature Keyboard JitterBug channel / / OperatingSystem Linux / OpenBSD / FreeBSD / Microsoft Windows / / Organization University of Pennsylvania / Matt Blaze Department of Computer / Federal Bureau of Investigation / ASIC / / Person Scarfo / Matt Blaze / Andres Molina / / Position guard / keyboard controller / spy / controller / / Product Keyboard JitterBug / / ProgrammingLanguage C / / ProvinceOrState Pennsylvania / / Technology Linux / encoding algorithm / decoding algorithm / operating system / scheduling algorithm / Quality of Service / Application layer encryption / operating systems / TCP/IP / link layer encryption / PS/2 protocol / encryption / ASIC / ASCII / VOIP / crypto algorithm / flash / e.g. encryption / link encryption / /
SocialTag |