Skip to search formSkip to main contentSkip to account menu

Backdoor (computing)

Known as: W32/Induc-A, Trusting trust, Secure golden key 
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The field of complex networks has seen a steady growth in the last decade, fuelled by an ever-growing collection of relational… 
2007
2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for… 
Highly Cited
2006
Highly Cited
2006
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation… 
Highly Cited
2005
Highly Cited
2005
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and… 
2005
2005
Are guestworker programs exploitative? Egalitarian and neoclassical theories of exploitation agree that they always are. But… 
Highly Cited
2003
Highly Cited
2003
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for… 
1992
1992
Anthropogenic activities that introduce an excess of nutrients and other pollutants into rivers and lakes are causing significant… 
1990
1990
We derive expressions for the spectrum of the field produced by planar, secondary Gaussian Schell-model sources after propagation… 
1984
1984
The comments by Azuma and Kojima are both encouraging and thought provoking. We thoroughly agree that there may be multiple…