Hans Spath

Learn More
The weakest link in software-based full disk encryption is the authentication procedure today. Since the master boot record must be present unencrypted in order to launch the decryption of remaining system parts, it can easily be manipulated and infiltrated by bootkits that perform keystroke logging; consequently password-based authentication schemes become(More)
  • 1