Back to Results
First PageMeta Content
Packet capture / Computer security / Cyberwarfare / Computer network security / Computing / Firewall


The Packet Vault: Secure Storage of Network Data C.J. Antonelli M. Undy P. Honeyman Center for Information Technology Integration The University of Michigan
Add to Reading List

Document Date: 2000-03-13 11:40:05


Open Document

File Size: 54,49 KB

Share Result on Facebook

City

Ann Arbor / Anaheim / San Antonio / San Diego / San Jose / /

Company

Prentice-Hall / CBC / RSA Laboratories / Secure Networks Inc. / /

/

Facility

University of Michigan Policy / Electronic Frontier Foundation’s DES cracker / University of Michigan / Information Technology Integration The University of Michigan Ann Arbor / /

IndustryTerm

brute-force search / mass storage device / invaluable systems / recent proposed encryption algorithms / exhaustive search / port-agile applications / packet vault hardware / intrusion detection algorithms / vault media / faster hardware / commodity hardware / virtual network / insecure systems / encryption algorithm / /

OperatingSystem

UNIX / Linux / OpenBSD / BSD / /

Organization

office of Policy Development / University of Michigan Policy / University of Michigan Ann Arbor / Center for Information Technology Integration / Network Data C.J. Antonelli M. Undy P. Honeyman Center / University Institutional Review Board / Congress / US Federal Reserve / Electronic Frontier Foundation / The University of Michigan / /

Person

Peter Gutmann / Phil Karn / Eric Thompson / Dan Boneh / Ronald L. Rivest / Dan Geer / Steven McCanne / Phillip Rogaway / Joe Saul / Whitfield Diffie / Marshall Kirk McKusick / Michael J. Karels / Keith Bostic / Thomas H. Ptacek / Van Jacobson / Timothy N. Newsham / Tsutomu Shimomura / Virginia Rezmierski / Joe Kilian / Matt Blaze / Mike Stolarchuk / Bruce Schneier / William Stallings / Joseph M. Saul / Peter Honeyman / Peter Sommer / Michael Wiener / /

Position

writer for its familiarity and flexibility / link level device driver / writer / administrator / /

ProvinceOrState

New Jersey / Michigan / Manitoba / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Symmetric key encryption / RAM / Asymmetric key encryption / UNIX / Linux / encryption algorithm / Information Technology / private key / Payload encryption / intrusion detection algorithms / encryption / Ethernet / cryptography / public key / recent proposed encryption algorithms / caching / digital signature / SCSI / /

URL

www.virtualcity.co.uk / www.counterpane / www.eff.org/DesCracker / /

SocialTag