Approaches to handling "Trojan Horse" threats

Yeheskel Lapid*, Niv Ahituv, Seev Neumann

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

This paper examines the exposure of an information system to an attack by a "Trojan Horse" and trapdoors. It outlines some new encryption-based mechanisms that can reduce risks and losses caused by such attacks. It proposes models exhibit the direction and nature of the solutions for the threats.

Original languageEnglish
Pages (from-to)251-256
Number of pages6
JournalComputers and Security
Volume5
Issue number3
DOIs
StatePublished - Sep 1986

Keywords

  • Data Encryption
  • Passwords
  • Security
  • Trojan Horse

Fingerprint

Dive into the research topics of 'Approaches to handling "Trojan Horse" threats'. Together they form a unique fingerprint.

Cite this