Cryptoviral extortion using Microsoft's Crypto API (English)
- New search for: Young, Adam L.
- New search for: Young, Adam L.
In:
International Journal of Information Security
;
5
, 2
;
67-76
;
2006
- Article (Journal) / Electronic Resource
-
Title:Cryptoviral extortion using Microsoft's Crypto API
-
Contributors:Young, Adam L. ( author )
-
Published in:International Journal of Information Security ; 5, 2 ; 67-76
-
Publisher:
- New search for: Springer-Verlag
-
Place of publication:Berlin/Heidelberg
-
Publication date:2006-03-08
-
Size:10 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 5, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 65
-
PrefaceZhou, Jianying / Lopez, Javier et al. | 2006
- 67
-
Cryptoviral extortion using Microsoft's Crypto APIYoung, Adam L. et al. | 2006
- 77
-
Execution transactions for defending against software failures: use and evaluationSidiroglou, Stelios / Keromytis, Angelos D. et al. | 2006
- 92
-
Hierarchical time-based information releaseNali, Deholo / Adams, Carlisle / Miri, Ali et al. | 2006
- 105
-
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial designChakrabarti, Dibyendu / Maitra, Subhamoy / Roy, Bimal et al. | 2006
- 115
-
On the security of the WinRAR encryption featureYeo, Gary S.-W. / Phan, Raphael C.-W. et al. | 2006