Malware Attacks on Electronic Signatures Revisited
暂无分享,去创建一个
[1] Armin B. Cremers,et al. Trojan horse attacks on software for electronic signatures , 2002, Informatica.
[2] Hanno Langweg. Building a Trusted Path for Applications Using COTS Components , 2004 .
[3] Ulrich Pordesch. Der fehlende Nachweis der Präsentation signierter Daten , 2000, Datenschutz und Datensicherheit.
[4] Armin B. Cremers,et al. Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs , 2001, SEC.
[5] Heiko Rossnagel,et al. How Secure are Current Mobile Operating Systems? , 2004, Communications and Multimedia Security.