Affiliation:
1. Univ. of Utah, Salt Lake City
Abstract
The following report has been gleaned from "A Tour of the Worm," an in-depth account of the November Internet infection. The author found the worm's crypt algorithm a frustrating, yet engaging, puzzle.
Publisher
Association for Computing Machinery (ACM)
Reference5 articles.
1. UNIX operating system security. AT&;Grampp F.T.;T Bell Laboratories Tech. I.,1984
2. Reflections on trusting trust
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献