Covert channel

Results: 66



#Item
61National Security Agency / Trusted Computer System Evaluation Criteria / Trusted computing / Trusted computing base / Multilevel security / Mandatory access control / Principle of least privilege / Covert channel / Secure Computing / Computer security / Software quality / Evaluation

Cost Profile of a Highly Assured, Secure Operating System Richard E. Smith Secure Computing Corporation

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
62Open / Computing / Software engineering / Software / Covert channel / Steganography / Memory leak

PDF Document

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2003-09-15 13:18:08
63Covert channel / Matter / Pumps / Fluid dynamics / Unidirectional network

PDF Document

Add to Reading List

Source URL: www.acsac.org

Language: English - Date: 2005-11-21 16:32:57
64Computer networking / Covert channel / Steganography / Channel / Keystroke logging / Timing attack / Transmission Control Protocol / Jitter / Overt channel / Computing / Espionage / Electronics

PDF Document

Add to Reading List

Source URL: crypto.com

Language: English - Date: 2006-08-07 14:09:37
65Steganography / Security / Digital photography / Digital watermarking / Watermark / Covert channel / Fingerprint / Microdot / Audio watermark detection / Cryptography / Watermarking / Espionage

PDF Document

Add to Reading List

Source URL: www.petitcolas.net

Language: English - Date: 2012-11-19 17:56:28
66Open / Computing / Software engineering / Software / Covert channel / Steganography / Memory leak

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1997-12-31 18:49:38
UPDATE