@dblp

Cryptovirology: Extortion-Based Security Threats and Countermeasures.

, and . S&P, page 129-140. IEEE Computer Society, (1996)

Links and resources

Tags