@dblp

Cryptovirology: Extortion-Based Security Threats and Countermeasures.

, and . IEEE Symposium on Security and Privacy, page 129-140. IEEE Computer Society, (1996)

Links and resources

Tags