Back to Results
First PageMeta Content
Packet capture / Transmission Control Protocol / Firewall / Data / Computer network security / Computing / Network architecture


Wiretapping the Internet C.J. Antonelli, P. Honeyman Center for Information Technology Integration, University of Michigan, Ann Arbor† ABSTRACT With network security threats and vulnerabilities increasing, solutions ba
Add to Reading List

Document Date: 2002-03-05 15:54:08


Open Document

File Size: 76,59 KB

Share Result on Facebook

City

Ann Arbor / Santa Clara / Anaheim / San Antonio / Report / San Diego / San Jose / /

Company

Prentice-Hall / Sony / Terabyte Storage Technologies / CBC / RSA Laboratories / Microsoft / the AES / Global Technologies Group Inc. / /

Currency

USD / /

/

Facility

Electronic Frontier Foundation’s DES cracker / Vault.14 University of Michigan Policy / University of Michigan / /

IndustryTerm

mass storage technologies / storage devices / physical media / brute-force search / technology lines / online detection / mass storage device / invaluable systems / potential solutions / software striping / intrusion detection products / media slots / exhaustive search / Internet C.J. Antonelli / private network / port-agile applications / commodity technologies / candidate mass storage technologies / mass storage output devices / commodity hardware / storage technologies / hardware encryption devices / magnetic media / dual-processor motherboard software implementation / train intrusion detection algorithms / /

OperatingSystem

UNIX / Linux / OpenBSD / BSD / /

Organization

office of Policy Development / Society of Photo-Optical Instrumentation Engineers / University of Michigan / Ann Arbor / P. Honeyman Center for Information Technology Integration / U.S. Government / Vault.14 University of Michigan Policy / Cryptographic / United States Department of Justice / University Institutional Review Board / Congress / U.S. Department of Justice / Electronic Frontier Foundation / the University of Michigan / /

Person

Peter Gutmann / Phil Karn / Stuart Haber / Eric Thompson / Jim Gray / Dan Boneh / Ronald L. Rivest / Steven McCanne / Phillip Rogaway / Whitfield Diffie / Marshall Kirk McKusick / Michael J. Karels / Prashant Shenoy / Keith Bostic / Van Jacobson / Tsutomu Shimomura / Virginia Rezmierski / Joe Kilian / Matt Blaze / Mike Stolarchuk / W. Scott Stornetta / Bruce Schneier / William Stallings / Joseph M. Saul / Peter Honeyman / Peter Sommer / Michael Wiener / /

Position

first author / writer for its familiarity and flexibility / striping controller / writer / administrator / /

Product

Vault / /

ProvinceOrState

New Jersey / Michigan / Manitoba / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Symmetric key encryption / RAM / storage technologies / Asymmetric key encryption / Linux / UNIX / Information Technology / candidate mass storage technologies / private key / commodity technologies / Encryption / Ethernet / cryptography / public key / mass storage technologies / train intrusion detection algorithms / caching / digital signature / SCSI / /

URL

www.virtualcity.co.uk / www.powercrypt.com / www.counterpane / www.usdoj.gov/jmd/pss/busopp.html / www.eff.org/DesCracker / http /

SocialTag