Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4914
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dudhait, Amar H. | - |
dc.date.accessioned | 2014-08-27T07:14:00Z | - |
dc.date.available | 2014-08-27T07:14:00Z | - |
dc.date.issued | 2014-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/4914 | - |
dc.description.abstract | Main purpose of this study is to analyze security issues related to keyboard input Security and then apply security at application level. Such security is not provided by current network protection technology or server protection technology. Due to this, area of research in keyboard input security has been one of major focus recently. In order to contribute to the project, an application has been built that secures keyboard input information. Solution of earlier researches and current application trends have suggested technology for Windows environment, while some issues has been analyzed regarding keyboard input security in Linux environment. Today Linux systems usage is rapidly increasing, so the solution will be helpful to provide input security in such situation. And also virtual keyboard application has been discussed which is able to secure keyboard input information in windows environment as part of implementation. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 12MCEI09; | - |
dc.subject | Computer 2012 | en_US |
dc.subject | Project Report 2012 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 12MCEI | en_US |
dc.subject | 12MCEI09 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2012 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Keyboard Input Security Using Virtual Keyboard | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEI09.pdf | 12MCEI09 | 1.49 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.