Author:
Davida G.I.,Desmedt Y.G.,Matt B.J.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Trojan Horses, Computer Viruses, and Worms;Encyclopedia of Cryptography, Security and Privacy;2024
2. CryptKSP: A Kernel Stack Protection Model Based on AES-NI Hardware Feature;ICT Systems Security and Privacy Protection;2022
3. Reducing Unauthorized Modification of Digital Objects;IEEE Transactions on Software Engineering;2012-01
4. Trojan Horses, Computer Viruses, and Worms;Encyclopedia of Cryptography and Security;2011
5. Practical Mobile Digital Signatures;E-Commerce and Web Technologies;2002