I haven't had a chance to read the paper yet, but while I was digging for references to cryptovirology I came across
this CiteSeer reference which discusses the use of cryptovirology in extortion threats.
Note: to read or download the paper yourself, click on one of the links in the upper right-hand corner.
No comments:
Post a Comment