-
1
-
-
3543070219
-
-
Canesta keyboards. http://www.canesta.com/products.htm.
-
-
-
-
3
-
-
3543141485
-
-
HoloTouch technology. http://www.holotouch.com.
-
-
-
-
4
-
-
3543076054
-
-
TouchStream keyboards. http://www.fingerworks.com/.
-
-
-
-
5
-
-
3543064356
-
-
The virtually indestructible keyboard. http://www.grandtec.com/vik.htm.
-
-
-
-
9
-
-
3543084201
-
-
Gaze-based secure keypad entry system. Patent US6282553
-
M. D. Flickner, Q. Lu, and C. H. Morimoto. Gaze-based secure keypad entry system. Patent US6282553, 2001.
-
(2001)
-
-
Flickner, M.D.1
Lu, Q.2
Morimoto, C.H.3
-
11
-
-
3543134500
-
Compromising emanations: Eavesdropping risks of computer displays
-
Computer Laboratory, University of Cambridge
-
M. G. Kuhn. Compromising emanations: eavesdropping risks of computer displays. Technical Report UCAM-CL-TR-577, Computer Laboratory, University of Cambridge, 2003.
-
(2003)
Technical Report
, vol.UCAM-CL-TR-577
-
-
Kuhn, M.G.1
-
12
-
-
3543073752
-
-
Personal communication. Feb.
-
M. G. Kuhn. Personal communication. Feb. 2004.
-
(2004)
-
-
Kuhn, M.G.1
-
15
-
-
3543073750
-
-
NACSIM 5000 TEMPEST fundamentals. National Security Agency, Fort George G. Meade, Maryland
-
NSA. NACSIM 5000 TEMPEST fundamentals. National Security Agency, Fort George G. Meade, Maryland, http://cryptome.org/nacsim-5000.zip.
-
-
-
-
16
-
-
3543092366
-
Secrecy is an illusion
-
Apr.
-
N. Petreley. Secrecy is an illusion. Computerworld, http://www. computerworld.co.nz/webhome.nsf/0/7237CE66D15E3BFFCC256B8A00%0C087B, Apr. 2002.
-
(2002)
Computerworld
-
-
Petreley, N.1
-
17
-
-
3543073751
-
-
Personal communication. Sept.
-
N. Petreley. Personal communication. Sept. 2003.
-
(2003)
-
-
Petreley, N.1
-
18
-
-
3543125042
-
Genetically optimised feedforward neural networks for speaker identification
-
Defence Science and Technology Organisation (Australia)
-
R. Price, J. Willmore, and W. Roberts. Genetically optimised feedforward neural networks for speaker identification. Technical Report DSTO-TN-0203, Defence Science and Technology Organisation (Australia), 1999.
-
(1999)
Technical Report
, vol.DSTO-TN-0203
-
-
Price, R.1
Willmore, J.2
Roberts, W.3
-
20
-
-
85084161110
-
Timing analysis of keystrokes and SSH timing attacks
-
Aug.
-
D. X. Song, D. Wagner, and X. Tian. Timing analysis of keystrokes and SSH timing attacks. In Proceedings of 10th USENIX Security Symposium, Washington DC, USA, Aug. 2001.
-
(2001)
Proceedings of 10th USENIX Security Symposium, Washington DC, USA
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
22
-
-
0038794800
-
-
Random House Value Pub
-
P. Wright. Spycatcher. Random House Value Pub, 1989.
-
(1989)
Spycatcher
-
-
Wright, P.1
-
23
-
-
0025901402
-
Recent developments of the SNNS neural network simulator
-
A. Zell, N. Mache, T. Sommer, and T. Korb. Recent developments of the SNNS neural network simulator. In Applications of Neural Networks Conf., SPIE, volume 1469, Orlando Florida, 1991.
-
(1991)
Applications of Neural Networks Conf., SPIE, Volume 1469, Orlando Florida
, vol.1469
-
-
Zell, A.1
Mache, N.2
Sommer, T.3
Korb, T.4
|