Skip to search formSkip to main contentSkip to account menu

Backdoor (computing)

Known as: W32/Induc-A, Trusting trust, Secure golden key 
A backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
Right to be forgotten, also known as the right to erasure, is the right of individuals to have their data erased from an entity… 
Review
2017
Review
2017
Teacher turnover is a challenge for U.S. public schools. Research suggests that teachers’ perceptions of their school working… 
Review
2008
Review
2008
Whereas the federal government has exclusive authority over immigration in the United States, during the past decade (and… 
Highly Cited
2008
Highly Cited
2008
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware… 
Highly Cited
2008
Highly Cited
2008
Malware detection and prevention is critical for the protection of computing systems across the Internet. The problem in… 
Review
2007
Review
2007
Morphological evidence for resolving relationships among arachnid orders was surveyed and assembled in a matrix comprising 59… 
Highly Cited
2007
Highly Cited
2007
Recent research has explored the dynamics of categorical thinking, with debate centering on the putative automaticity of this… 
Highly Cited
2001
Highly Cited
2001
Recently, many research works have been reported about how physical cryptanalysis can be carried out on cryptographic devices by… 
Highly Cited
1991
Highly Cited
1991
The presented book we offer here is not kind of usual book. You know, reading now doesn't mean to handle the printed book in your… 
Highly Cited
1989
Highly Cited
1989
Paul's letters, the earliest writings in the New Testament, are filled with allusions, images and quotations from the Old…