Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,649,890 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption software
Known as:
Container encryption
, Encryption on Linux
Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
BestCrypt
BitLocker
Cold boot attack
Comparison of disk encryption software
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Efficient Protocol for Searchable encryption and secure deletion on cloud storages
Joon-Woo Yu
,
Hyoung-Kee Choi
IEEE International Conference on Consumer…
2017
Corpus ID: 19322308
Cloud-storage services have become popular and useful to individuals and corporations. The files and information stored in remote…
Expand
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
2013
2013
Security in Android File System
Miss Kirti
,
P. Lokhande
2013
Corpus ID: 17575236
Recently smart gadgets including smart phones and tablets are gaining popularity. These devices contain Personal Identifiable…
Expand
2013
2013
Achieving successful and sustainable software implementations
Keith Mcneil
,
Stephen Hanman
2013
Corpus ID: 167734548
How many managers, when assigned the task of leading a software project, would prefer to leave town? Their concerns are justified…
Expand
2013
2013
Securing Files Using AES Algorithm
Aditya Rayarapu
,
A. Saxena
,
N. Krishna
,
Diksha Mundhra
2013
Corpus ID: 59018313
— Nowadays information systems play a vital role for organizations and individuals, in which the security is given the high…
Expand
2011
2011
Randomness Re-use in Broadcast Encryption
Paolo Gasti
,
A. Merlo
2011
Corpus ID: 10945444
Broadcast encryption provides an efficient way to encrypt a message for a large number of receivers. This paper investigates…
Expand
2011
2011
On Re-use of randomness in broadcast encryption
Paolo Gasti
,
A. Merlo
Ninth Annual International Conference on Privacy…
2011
Corpus ID: 9330103
Broadcast encryption provides an efficient way to encrypt a message for a large number of receivers. This paper investigates…
Expand
2010
2010
A TRUSTED STORAGE SYSTEM FOR THE CLOUD
Sushama Karumanchi
2010
Corpus ID: 166454190
OF THESIS A TRUSTED STORAGE SYSTEM FOR THE CLOUD Data stored in third party storage systems like the cloud might not be secure…
Expand
2008
2008
A framework for computer forensics investigations involving Microsoft Vista
D. Hayes
,
S. Qureshi
IEEE Long Island Systems, Applications and…
2008
Corpus ID: 16087408
The technical environment continues to change and impact the work of digital investigations. This research provides a framework…
Expand
2007
2007
Tamper Resistant Network Tracing
Andrew G. Miklas
,
S. Saroiu
,
A. Wolman
,
Angela Demke Brown
ACM Workshop on Hot Topics in Networks
2007
Corpus ID: 15280874
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE