Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,627,802 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption software
Known as:
Container encryption
, Encryption on Linux
Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
BestCrypt
BitLocker
Cold boot attack
Comparison of disk encryption software
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Efficient Protocol for Searchable encryption and secure deletion on cloud storages
Joon-Woo Yu
,
Hyoung-Kee Choi
IEEE International Conference on Consumer…
2017
Corpus ID: 19322308
Cloud-storage services have become popular and useful to individuals and corporations. The files and information stored in remote…
Expand
2016
2016
Data Node Encrypted File System
Joel Reardon
2016
Corpus ID: 86783566
This chapter presents DNEFS, a file system change that provides fine-grained secure data deletion and is particularly suited to…
Expand
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
2013
2013
Security in Android File System
Miss Kirti
,
P. Lokhande
2013
Corpus ID: 17575236
Recently smart gadgets including smart phones and tablets are gaining popularity. These devices contain Personal Identifiable…
Expand
2013
2013
Achieving successful and sustainable software implementations
Keith Mcneil
,
Stephen Hanman
2013
Corpus ID: 167734548
How many managers, when assigned the task of leading a software project, would prefer to leave town? Their concerns are justified…
Expand
2011
2011
Randomness Re-use in Broadcast Encryption
Paolo Gasti
,
A. Merlo
2011
Corpus ID: 10945444
Broadcast encryption provides an efficient way to encrypt a message for a large number of receivers. This paper investigates…
Expand
2010
2010
A TRUSTED STORAGE SYSTEM FOR THE CLOUD
Sushama Karumanchi
2010
Corpus ID: 166454190
OF THESIS A TRUSTED STORAGE SYSTEM FOR THE CLOUD Data stored in third party storage systems like the cloud might not be secure…
Expand
2009
2009
Efficient methodology for implementation of Encrypted File System in User Space
Shishir Kumar
,
U. Rawat
,
S. K. Jasra
,
A. Jain
arXiv.org
2009
Corpus ID: 568453
The Encrypted File System (EFS) pushes encryption services into the file system itself. EFS supports secure storage at the system…
Expand
2008
2008
A framework for computer forensics investigations involving Microsoft Vista
D. Hayes
,
S. Qureshi
IEEE Long Island Systems, Applications and…
2008
Corpus ID: 16087408
The technical environment continues to change and impact the work of digital investigations. This research provides a framework…
Expand
2007
2007
Tamper Resistant Network Tracing
Andrew G. Miklas
,
S. Saroiu
,
A. Wolman
,
Angela Demke Brown
ACM Workshop on Hot Topics in Networks
2007
Corpus ID: 15280874
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required