First Page | Meta Content | |
---|---|---|
Document Date: 2006-08-07 14:09:37Open Document File Size: 484,00 KBShare Result on FacebookCompanyIBM / Microsoft / / /EventNatural Disaster / Man-Made Disaster / /FacilityUS Prison / Information Science University of Pennsylvania / /IndustryTermcovert network / digital input device / crypto systems / c Internet Add Jitters JitterBug Sender Look / crypto algorithm / typical general purpose computing systems / less interactive network applications / Internet Destination Receiver / network computing applications / interactive network applications / web browsers / software-based network / hardware device / software trojan / input devices / coupled network / manufacturing process / input device / keylogger device / mix networks / software vulnerability / conventional computer systems / relay device / above applications / application software / cryptographic algorithms / usable and practical network / interactive network software / host software / external network / malicious covert network / web camera / attack tool / compromised input device / hardware interception device / e.g. software / /NaturalFeatureKeyboard JitterBug channel / /OperatingSystemLinux / OpenBSD / FreeBSD / Microsoft Windows / /OrganizationUniversity of Pennsylvania / Matt Blaze Department of Computer / Federal Bureau of Investigation / ASIC / /PersonScarfo / Matt Blaze / Andres Molina / /Positionguard / keyboard controller / spy / controller / /ProductKeyboard JitterBug / /ProgrammingLanguageC / /ProvinceOrStatePennsylvania / /TechnologyLinux / encoding algorithm / decoding algorithm / operating system / scheduling algorithm / Quality of Service / Application layer encryption / operating systems / TCP/IP / link layer encryption / PS/2 protocol / encryption / ASIC / ASCII / VOIP / crypto algorithm / e.g. encryption / link encryption / /SocialTag |