Abstract
This paper examines the exposure of an information system to an attack by a "Trojan Horse" and trapdoors. It outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks. It proposes models exhibit the direction and nature of the solutions for the threats.
Original language | English |
---|---|
Pages (from-to) | 251-256 |
Number of pages | 6 |
Journal | Computers and Security |
Volume | 5 |
Issue number | 3 |
DOIs | |
State | Published - Sep 1986 |
Keywords
- Data Encryption
- Passwords
- Security
- Trojan Horse