Academic literature on the topic 'Trojan horse attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojan horse attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trojan horse attack"

1

Jiang, Dong, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen. "Eavesdropping on quantum secret sharing protocols based on ring topology." Quantum Information and Computation 19, no. 7&8 (2019): 587–600. http://dx.doi.org/10.26421/qic19.7-8-4.

Full text
Abstract:
Quantum secret sharing (QSS) is the process of splitting a secret message into multiple parts such that no subset of parts is sufficient to reconstruct the secret message, but the entire set is. Ever since the first protocol was proposed, QSS has attracted intensive study, and many protocols have been proposed and implemented over recent years. However, we discover that several ring-topology based QSS protocols cannot resist Trojan-horse attacks. In this paper, we first give a modified Trojan-horse attack strategy and show that the eavesdropper can obtain any player's private data and the deal
APA, Harvard, Vancouver, ISO, and other styles
2

于, 家涛. "Analysis of Trojan-Horse Attack against Untrusted Source." Computer Science and Application 08, no. 01 (2018): 59–66. http://dx.doi.org/10.12677/csa.2018.81009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renolafitri, Hendrini. "“An Analysis of Trojan Horse Affairs, Measuring the Impact of Hoax Produced by Anti-Muslim Government in the UK”." POLITEA 2, no. 2 (2019): 127. http://dx.doi.org/10.21043/politea.v2i2.6329.

Full text
Abstract:
<p>This paper highlights one concrete example of how the power of <em>Hoaxes</em> can provide an extra-ordinary significant impact to the country. The term<em> </em>of <em>the Trojan Horse Affairs</em> make this issue more interesting for the author to discuss. The term of <em>Trojan Horse </em>generally used in technological science to describe the existence of the <em>malware </em>or <em>viruses</em> activity, whos hiding in suspicious forms and then damage the core systems on a computer or steal its data. The dama
APA, Harvard, Vancouver, ISO, and other styles
4

Molotkov, S. N. "Unambiguous measurements and Trojan-horse attack in quantum cryptography." Laser Physics Letters 17, no. 1 (2019): 015203. http://dx.doi.org/10.1088/1612-202x/ab5d25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Chun-Wei, and Tzonelih Hwang. "Trojan horse attack free fault-tolerant quantum key distribution protocols." Quantum Information Processing 13, no. 3 (2013): 781–94. http://dx.doi.org/10.1007/s11128-013-0689-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tsai, Chia-Wei, and Chun-Wei Yang. "Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack." Laser Physics Letters 17, no. 7 (2020): 075202. http://dx.doi.org/10.1088/1612-202x/ab9444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pan, Yaxi, Ling Zhang, and Duan Huang. "Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution." Applied Sciences 10, no. 21 (2020): 7788. http://dx.doi.org/10.3390/app10217788.

Full text
Abstract:
As the existence of non-zero reflection coefficients in the real component of continuous-variable quantum key distribution (CV-QKD) systems, Eve can probe the system by sending the bright light pulses into Alice’s set-up. With the analysis of back-reflections, Eve only takes a few back-reflected photons to intercept information and obtain the raw key bit. In this paper, the attack problems are converted into the information leakage problems. First, we analyzed the Trojan horse attacks with different wavelengths and confirmed its side effects, such as crosstalk and anti-Stokes Raman scattering,
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Chih-Hung, Chun-Wei Yang, and Tzonelih Hwang. "Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States." International Journal of Theoretical Physics 55, no. 9 (2016): 3993–4004. http://dx.doi.org/10.1007/s10773-016-3028-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.

Full text
Abstract:
Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a secret key is the objective of the mediated semi-quantum key distribution (MSQKD) protocol. However, the existing MSQKD protocols need a quantum user to assist two classical users in distributing the secret keys, and these protocols require that the classical users be equipped with a Trojan horse photon detector. This reduces the practicability of the MSQKD protocols. Therefore, in this study we propose a lightweight MSQKD, in which the tw
APA, Harvard, Vancouver, ISO, and other styles
10

Ma, Hong-Xin, Wan-Su Bao, Hong-Wei Li, and Chun Chou. "Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack." Chinese Physics B 25, no. 8 (2016): 080309. http://dx.doi.org/10.1088/1674-1056/25/8/080309.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Trojan horse attack"

1

Shanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.

Full text
Abstract:
This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techn
APA, Harvard, Vancouver, ISO, and other styles
2

Makarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.

Full text
Abstract:
<p>This doctoral thesis summarizes research in quantum cryptography done at the Department of Electronics and Telecommunications at the Norwegian University of Science and Technology (NTNU) from 1998 through 2007.</p><p>The opening parts contain a brief introduction into quantum cryptography as well as an overview of all existing single photon detection techniques for visible and near infrared light. Then, our implementation of a fiber optic quantum key distribution (QKD) system is described. We employ a one-way phase coding scheme with a 1310 nm attenuated laser source and a polarization-main
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trojan horse attack"

1

Cohen, Ronen A. "Acts of Terror and Assassination—The Trojan Horse Inside the Islamic Revolution." In Revolution Under Attack. Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137502506_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peng, Jinye, Guangqiang He, Jin Xiong, and Guihua Zeng. "Trojan Horse Attack Strategy on Quantum Private Communication." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Peiyu, Bingru Niu, and Zhenfang Zhu. "A Kind of Improved Detection and Prevention of Trojan Horse Based on Attack Tree." In Pervasive Computing and the Networked World. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09265-2_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spalka, Adrian, Armin B. Cremers, and Hanno Langweg. "Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs." In IFIP Advances in Information and Communication Technology. Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Lawful Trojan Horse." In Applying Internet Laws and Regulations to Educational Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-4555-3.ch001.

Full text
Abstract:
News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.
APA, Harvard, Vancouver, ISO, and other styles
6

Mann, Bruce L. "Lawful Trojan Horse." In Research Anthology on Business Aspects of Cybersecurity. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch029.

Full text
Abstract:
News outlets don't usually report on training methods in counter-cyberterrorism, particularly lawful trojan attacks. Instead they describe recent cyberterrorist attacks, or threats, or laws and regulations concerning internet privacy or identity theft. Yet Europe is looking to do just that to head-off the next major cyberattack by creating rules for how member states should react and respond. Several news outlets, for example, reported that Germany's Federal Criminal Police Office (BKA) were using a Trojan Horse to access the smartphone data of suspected individuals before the information was encrypted. Although the urge to strike back may be palpable, hacking-back can put power back into the hands of the suspect. The consensus now is that government action is preferable to hacking-back at attackers.
APA, Harvard, Vancouver, ISO, and other styles
7

Zempi, Irene, and Imran Awan. "Triggers of Islamophobic violence." In Islamophobia. Policy Press, 2016. http://dx.doi.org/10.1332/policypress/9781447331964.003.0003.

Full text
Abstract:
This chapter examines the factors that determine the prevalence and severity of Islamophobia, namely ‘trigger’ events of local, national and international significance. Correspondingly, participants in this study reported that the prevalence of both online and offline Islamophobia increased following recent high-profile terrorist attacks around the world such as Sydney, the attacks in Paris, Copenhagen and Tunisia. In addition, national scandals such as the grooming of young girls in Rotherham by groups of Pakistani men and the alleged ‘Trojan Horse’ scandal in Birmingham framed as a ‘jihadist plot’ to take over schools, were also highlighted as ‘trigger’ events. The visibility and intersectionality of victims’ identities is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Haraty, Ramzi A. "Kernelized Database Systems Security." In Encyclopedia of Database Technologies and Applications. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-560-3.ch052.

Full text
Abstract:
There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths &amp; Wade, 1976). Discretionary security is not adequate in a multilevel secure environment, however, because it does not prevent Trojan horse attacks and provides a low level of assurance. Mandatory security, on the other hand, restricts access of data items to cleared database users. It is widely exploited in military applications and provides a high assurance.
APA, Harvard, Vancouver, ISO, and other styles
9

Haraty, Ramzi A. "Kernelized Database Systems Security." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch103.

Full text
Abstract:
There are two main types of security in database systems: discretionary security and mandatory security. Discretionary security restricts access to data items at the discretion of the owner. Most commercial database management systems (DBMS) employ some form of discretionary security by controlling access privileges and modes of data users (Griffiths &amp; Wade, 1976). Discretionary security is not adequate in a multilevel secure environment, however, because it does not prevent Trojan horse attacks and provides a low level of assurance. Mandatory security, on the other hand, restricts access of data items to cleared database users. It is widely exploited in military applications and provides a high assurance.
APA, Harvard, Vancouver, ISO, and other styles
10

Farooq-i-Azam, Muhammad, and Muhammad Naeem Ayyaz. "Embedded Systems Security." In Software Design and Development. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4301-7.ch047.

Full text
Abstract:
Not long ago, it was thought that only software applications and general purpose digital systems i.e. computers were prone to various types of attacks against their security. The underlying hardware, hardware implementations of these software applications, embedded systems, and hardware devices were considered to be secure and out of reach of these attacks. However, during the previous few years, it has been demonstrated that novel attacks against the hardware and embedded systems can also be mounted. Not only viruses, but worms and Trojan horses have been developed for them, and they have also been demonstrated to be effective. Whereas a lot of research has already been done in the area of security of general purpose computers and software applications, hardware and embedded systems security is a relatively new and emerging area of research. This chapter provides details of various types of existing attacks against hardware devices and embedded systems, analyzes existing design methodologies for their vulnerability to new types of attacks, and along the way describes solutions and countermeasures against them for the design and development of secure systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trojan horse attack"

1

Sakurai, Shoji, and Shinobu Ushirozawa. "Input method against Trojan horse and replay attack." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689592.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jin, Cong, Xiao-Yan Wang, and Hua-Yong Tan. "Dynamic Attack Tree and Its Applications on Trojan Horse Detection." In 2010 Second International Conference on Multimedia and Information Technology. IEEE, 2010. http://dx.doi.org/10.1109/mmit.2010.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Dan, and Xiao-Hong Kuang. "A Generic Model for Trojan Horse Attacks Prevention and Handling." In 2015 2nd International Workshop on Materials Engineering and Computer Sciences. Atlantis Press, 2015. http://dx.doi.org/10.2991/iwmecs-15.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McDermott, J. "Prolepsis on the problem of Trojan-horse based integrity attacks (position paper)." In the 1998 workshop. ACM Press, 1998. http://dx.doi.org/10.1145/310889.310911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stiller, Birgit, Imran Khan, Nitin Jain, et al. "Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks." In CLEO: QELS_Fundamental Science. OSA, 2015. http://dx.doi.org/10.1364/cleo_qels.2015.ff1a.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sushchev, Ivan S., Diana M. Guzairova, Andrey N. Klimov, et al. "Practical security analysis against the Trojan-horse attacks on fiber-based phase-coding QKD system in the wide spectral range." In Emerging Imaging and Sensing Technologies for Security and Defence VI, edited by Richard C. Hollins, Gerald S. Buller, Robert A. Lamb, and Martin Laurenzis. SPIE, 2021. http://dx.doi.org/10.1117/12.2600126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!