Cryptovirology: Extortion-Based Security Threats and Countermeasures.
Adam L. YoungMoti YungPublished in: IEEE Symposium on Security and Privacy (1996)
Keyphrases
- countermeasures
- security threats
- information security
- security issues
- security measures
- security mechanisms
- sensitive data
- security risks
- network security
- intrusion detection
- smart card
- power analysis
- key management
- information systems
- security requirements
- information technology
- security management
- computer security
- real world
- operating system
- e government
- data mining