|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10 occurrences of 9 keywords
|
|
|
Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
122 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
65 | Adam L. Young, Moti Yung |
Cryptovirology: Extortion-Based Security Threats and Countermeasures. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
35 | Mohsen Mohamed Hadji, Samir Ladaci |
State Space Feedback Control with Fractional Order $\text{PI}^{\lambda}$ Configuration for Fractional Order Cryptovirology Stabilization in Blockchain Systems. |
SSD |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Aaron Zimba, Zhaoshun Wang, Hongsong Chen, Mwenge Mulenga |
Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks. |
KSII Trans. Internet Inf. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
35 | Adam L. Young, Moti Yung |
Cryptovirology: the birth, neglect, and explosion of ransomware. |
Commun. ACM |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Saurabh Anandrao Shivale |
Cryptovirology: Virus Approach |
CoRR |
2011 |
DBLP BibTeX RDF |
|
35 | Sébastien Josse |
White-box attack context cryptovirology. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
35 | |
Book review: Cryptography: Malicious Cryptography ? Exposing Cryptovirology Dr. Adam L. Young and Dr. Moti Yung, 2004, soft-cover, Wiley Publishing Inc., 392 pp., £29.99, ISBN 0 7645 4975 8.. |
Comput. Law Secur. Rev. |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Adam L. Young, Moti Yung |
Malicious cryptography - exposing cryptovirology. |
|
2004 |
RDF |
|
33 | Constantinos Patsakis, Nikolaos Alexandris |
A New SETUP for Factoring Based Algorithms. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
Secretly Embedded Trapdoor with Universal Protection, Coppersmith's theorem, cryptovirology, RSA, public key cryptography, factoring, backdoor |
Displaying result #1 - #10 of 10 (100 per page; Change: )
|
|