Cryptoviral extortion using Microsoft's Crypto API.
Adam L. YoungPublished in: Int. J. Inf. Sec. (2006)
Keyphrases
- code examples
- application programming interface
- source code
- business intelligence
- security protocols
- windows nt
- third party
- sql server
- visual basic
- microsoft sql server
- microsoft business intelligence
- databases
- mouse clicks
- windows xp
- microsoft word
- enterprise search
- google maps
- application developers
- open source
- microsoft windows
- web applications
- data streaming
- object oriented
- end users
- high level