Skip to search formSkip to main contentSkip to account menu

Backdoor (computing)

Known as: W32/Induc-A, Trusting trust, Secure golden key 
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The manufacturer of an asymmetric backdoor for a public key cryptosystem manipulates the key generation process in such a way… 
2013
2013
VILO is a lazy learner system designed for malware classification and triage. It implements a nearest neighbor (NN) algorithm… 
2011
2011
Alasdair Mann, the noted scholar of book culture in early modern Scotland, has suggested that a significant change had occurred… 
2007
2007
The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for… 
Highly Cited
2006
Highly Cited
2006
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation… 
Highly Cited
2005
Highly Cited
2005
Protecting sensitive files from a compromised system helps administrators to thwart many attacks, discover intrusion trails, and… 
Highly Cited
2003
Highly Cited
2003
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for… 
1992
1992
Anthropogenic activities that introduce an excess of nutrients and other pollutants into rivers and lakes are causing significant… 
1990
1990
We derive expressions for the spectrum of the field produced by planar, secondary Gaussian Schell-model sources after propagation… 
1984
1984
The comments by Azuma and Kojima are both encouraging and thought provoking. We thoroughly agree that there may be multiple…