Statements (21)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:academic
|
gptkbp:application |
public-key cryptography
asymmetric cryptography |
gptkbp:focusesOn |
use of cryptography for malicious purposes
|
https://www.w3.org/2000/01/rdf-schema#label |
cryptovirology
|
gptkbp:introduced |
gptkb:Moti_Yung
gptkb:Adam_L._Young |
gptkbp:introducedIn |
1996
|
gptkbp:notableExample |
gptkb:cryptoviral_extortion
malware cryptotrojan |
gptkbp:relatedTo |
computer security
cryptography information security |
gptkbp:studies |
malware
covert communication information hiding cryptographic attacks deniable communication |
gptkbp:bfsParent |
gptkb:malware
|
gptkbp:bfsLayer |
4
|