This paper examines the exposure of an information system to an attack by a "Trojan Horse" and trapdoors. It outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks. It proposes models exhibit the direction and nature of the solutions for the threats.
|Number of pages||6|
|Journal||Computers and Security|
|State||Published - Sep 1986|
- Data Encryption
- Trojan Horse