Cryptovirology
Results: 4
# | Item |
---|---|
1 | The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challengeAdd to Reading ListSource URL: esec-lab.sogeti.comLanguage: English - Date: 2016-07-01 12:08:46 |
2 | Ransomware phenomenon Extortion scheme Archetype of modern malware Conclusion Comparative analysis of various ransomware viriiAdd to Reading ListSource URL: esec-lab.sogeti.comLanguage: English - Date: 2016-07-01 12:08:46 |
3 | Cryptovirology A matter of precision A matter of time A matter of stealth Last wordsAdd to Reading ListSource URL: www.quarkslab.comLanguage: English - Date: 2013-07-15 08:52:43 |
4 | The challenge Victim targeting using random generators Auto-protection using deniable encryption Invisibility using statistical simulability The challengeAdd to Reading ListSource URL: cansecwest.comLanguage: English - Date: 2008-06-12 15:35:33 |