Publisher
Springer International Publishing
Reference43 articles.
1. S. Abidin, R. Kumar and V. Tiwari, “A Review Report on Cryptovirology and Cryptography”, International Journal of Scientific & Engineering Research, 3, 11(2012), pp 1–4.
2. A. Albertini, J-P. Aumasson, M. Eichlseder, F. Mendel, and M. Schläffer, “Malicious Hashing: Eve’s Variant of SHA-1”, Selected Areas in Cryptography – SAC 2014, Lecture Notes in Computer Science 8781, Springer, 2014, pp 1–19.
3. S. S. Anandrao, “Cryptovirology: Virus Approach”, International Journal of Network Security & Its Applications, 3, 4(2011), pp 33–46.
4. P. Beaucamps and E. Filiol. “On the Possibility of Practically Obfuscating Programs – Towards a Unified Perspective of Code Protection”, Journal in Computer Virology, 3, 1(2007), pp 3–21.
5. CACM Staff, “Cybersecurity”, Communications of the ACM, 60, 4(2017), pp 20–21.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献