Academic literature on the topic 'Trojan horse attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojan horse attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Trojan horse attack"
Jiang, Dong, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen. "Eavesdropping on quantum secret sharing protocols based on ring topology." Quantum Information and Computation 19, no. 7&8 (2019): 587–600. http://dx.doi.org/10.26421/qic19.7-8-4.
Full text于, 家涛. "Analysis of Trojan-Horse Attack against Untrusted Source." Computer Science and Application 08, no. 01 (2018): 59–66. http://dx.doi.org/10.12677/csa.2018.81009.
Full textRenolafitri, Hendrini. "“An Analysis of Trojan Horse Affairs, Measuring the Impact of Hoax Produced by Anti-Muslim Government in the UK”." POLITEA 2, no. 2 (2019): 127. http://dx.doi.org/10.21043/politea.v2i2.6329.
Full textMolotkov, S. N. "Unambiguous measurements and Trojan-horse attack in quantum cryptography." Laser Physics Letters 17, no. 1 (2019): 015203. http://dx.doi.org/10.1088/1612-202x/ab5d25.
Full textYang, Chun-Wei, and Tzonelih Hwang. "Trojan horse attack free fault-tolerant quantum key distribution protocols." Quantum Information Processing 13, no. 3 (2013): 781–94. http://dx.doi.org/10.1007/s11128-013-0689-3.
Full textTsai, Chia-Wei, and Chun-Wei Yang. "Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack." Laser Physics Letters 17, no. 7 (2020): 075202. http://dx.doi.org/10.1088/1612-202x/ab9444.
Full textPan, Yaxi, Ling Zhang, and Duan Huang. "Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution." Applied Sciences 10, no. 21 (2020): 7788. http://dx.doi.org/10.3390/app10217788.
Full textChang, Chih-Hung, Chun-Wei Yang, and Tzonelih Hwang. "Trojan Horse Attack Free Fault-Tolerant Quantum Key Distribution Protocols Using GHZ States." International Journal of Theoretical Physics 55, no. 9 (2016): 3993–4004. http://dx.doi.org/10.1007/s10773-016-3028-5.
Full textTsai, Chia-Wei, Chun-Wei Yang, and Narn-Yih Lee. "Lightweight mediated semi-quantum key distribution protocol." Modern Physics Letters A 34, no. 34 (2019): 1950281. http://dx.doi.org/10.1142/s021773231950281x.
Full textMa, Hong-Xin, Wan-Su Bao, Hong-Wei Li, and Chun Chou. "Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack." Chinese Physics B 25, no. 8 (2016): 080309. http://dx.doi.org/10.1088/1674-1056/25/8/080309.
Full textDissertations / Theses on the topic "Trojan horse attack"
Shanmugam, Karthikeyan. "Validating digital forensic evidence." Thesis, Brunel University, 2011. http://bura.brunel.ac.uk/handle/2438/7651.
Full textMakarov, Vadim. "Quantum cryptography and quantum cryptanalysis." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-1473.
Full textBook chapters on the topic "Trojan horse attack"
Cohen, Ronen A. "Acts of Terror and Assassination—The Trojan Horse Inside the Islamic Revolution." In Revolution Under Attack. Palgrave Macmillan US, 2015. http://dx.doi.org/10.1057/9781137502506_4.
Full textPeng, Jinye, Guangqiang He, Jin Xiong, and Guihua Zeng. "Trojan Horse Attack Strategy on Quantum Private Communication." In Information Security Practice and Experience. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11689522_17.
Full textLiu, Peiyu, Bingru Niu, and Zhenfang Zhu. "A Kind of Improved Detection and Prevention of Trojan Horse Based on Attack Tree." In Pervasive Computing and the Networked World. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-09265-2_38.
Full textSpalka, Adrian, Armin B. Cremers, and Hanno Langweg. "Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs." In IFIP Advances in Information and Communication Technology. Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_28.
Full text"Lawful Trojan Horse." In Applying Internet Laws and Regulations to Educational Technology. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-4555-3.ch001.
Full textMann, Bruce L. "Lawful Trojan Horse." In Research Anthology on Business Aspects of Cybersecurity. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3698-1.ch029.
Full textZempi, Irene, and Imran Awan. "Triggers of Islamophobic violence." In Islamophobia. Policy Press, 2016. http://dx.doi.org/10.1332/policypress/9781447331964.003.0003.
Full textHaraty, Ramzi A. "Kernelized Database Systems Security." In Encyclopedia of Database Technologies and Applications. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-560-3.ch052.
Full textHaraty, Ramzi A. "Kernelized Database Systems Security." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch103.
Full textFarooq-i-Azam, Muhammad, and Muhammad Naeem Ayyaz. "Embedded Systems Security." In Software Design and Development. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4301-7.ch047.
Full textConference papers on the topic "Trojan horse attack"
Sakurai, Shoji, and Shinobu Ushirozawa. "Input method against Trojan horse and replay attack." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689592.
Full textJin, Cong, Xiao-Yan Wang, and Hua-Yong Tan. "Dynamic Attack Tree and Its Applications on Trojan Horse Detection." In 2010 Second International Conference on Multimedia and Information Technology. IEEE, 2010. http://dx.doi.org/10.1109/mmit.2010.12.
Full textTang, Dan, and Xiao-Hong Kuang. "A Generic Model for Trojan Horse Attacks Prevention and Handling." In 2015 2nd International Workshop on Materials Engineering and Computer Sciences. Atlantis Press, 2015. http://dx.doi.org/10.2991/iwmecs-15.2015.34.
Full textMcDermott, J. "Prolepsis on the problem of Trojan-horse based integrity attacks (position paper)." In the 1998 workshop. ACM Press, 1998. http://dx.doi.org/10.1145/310889.310911.
Full textStiller, Birgit, Imran Khan, Nitin Jain, et al. "Quantum hacking of continuous-variable quantum key distribution systems: realtime Trojan-horse attacks." In CLEO: QELS_Fundamental Science. OSA, 2015. http://dx.doi.org/10.1364/cleo_qels.2015.ff1a.7.
Full textSushchev, Ivan S., Diana M. Guzairova, Andrey N. Klimov, et al. "Practical security analysis against the Trojan-horse attacks on fiber-based phase-coding QKD system in the wide spectral range." In Emerging Imaging and Sensing Technologies for Security and Defence VI, edited by Richard C. Hollins, Gerald S. Buller, Robert A. Lamb, and Martin Laurenzis. SPIE, 2021. http://dx.doi.org/10.1117/12.2600126.
Full text