The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptovirology with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2022 (10)
Publication types (Num. hits)
article(5) book(1) inproceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10 occurrences of 9 keywords

Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
122Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
65Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
35Mohsen Mohamed Hadji, Samir Ladaci State Space Feedback Control with Fractional Order $\text{PI}^{\lambda}$ Configuration for Fractional Order Cryptovirology Stabilization in Blockchain Systems. Search on Bibsonomy SSD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Aaron Zimba, Zhaoshun Wang, Hongsong Chen, Mwenge Mulenga Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
35Adam L. Young, Moti Yung Cryptovirology: the birth, neglect, and explosion of ransomware. Search on Bibsonomy Commun. ACM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Saurabh Anandrao Shivale Cryptovirology: Virus Approach Search on Bibsonomy CoRR The full citation details ... 2011 DBLP  BibTeX  RDF
35Sébastien Josse White-box attack context cryptovirology. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35 Book review: Cryptography: Malicious Cryptography ? Exposing Cryptovirology Dr. Adam L. Young and Dr. Moti Yung, 2004, soft-cover, Wiley Publishing Inc., 392 pp., £29.99, ISBN 0 7645 4975 8.. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Adam L. Young, Moti Yung Malicious cryptography - exposing cryptovirology. Search on Bibsonomy 2004   RDF
33Constantinos Patsakis, Nikolaos Alexandris A New SETUP for Factoring Based Algorithms. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secretly Embedded Trapdoor with Universal Protection, Coppersmith's theorem, cryptovirology, RSA, public key cryptography, factoring, backdoor
Displaying result #1 - #10 of 10 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license