Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,255 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption software
Known as:
Container encryption
, Encryption on Linux
Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
45 relations
BestCrypt
BitLocker
Cold boot attack
Comparison of disk encryption software
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Efficient Protocol for Searchable encryption and secure deletion on cloud storages
Joon-Woo Yu
,
Hyoung-Kee Choi
IEEE International Conference on Consumer…
2017
Corpus ID: 19322308
Cloud-storage services have become popular and useful to individuals and corporations. The files and information stored in remote…
Expand
2013
2013
S ECURE P ARTIAL I MAGE E NCRYPTION S CHEME U SING S CAN B ASED A LGORITHM
Parameshachari
,
K. Soyjaudah
,
S. Devi
2013
Corpus ID: 15624277
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies…
Expand
2013
2013
Security in Android File System
Miss Kirti
,
P. Lokhande
2013
Corpus ID: 17575236
Recently smart gadgets including smart phones and tablets are gaining popularity. These devices contain Personal Identifiable…
Expand
2013
2013
Securing Files Using AES Algorithm
Aditya Rayarapu
,
A. Saxena
,
N. Krishna
,
Diksha Mundhra
2013
Corpus ID: 59018313
— Nowadays information systems play a vital role for organizations and individuals, in which the security is given the high…
Expand
2013
2013
Accelerating user-space applications with FPGA cores : profiling and evaluation of the PCIe interface
R. A. Redol
,
R. Chaves
,
P. Tomás
2013
Corpus ID: 53390137
This paper describes the process of implementing a custom accelerator in a reconfigurable device with the PCI Express interface…
Expand
2013
2013
A Generic Evolution of Key Using Quantum Cryptography Management for Transcript
Basant Dhakad
,
Dharmendra Gwala
,
Manish Sharma
,
Vivek Shrivastava
2013
Corpus ID: 15523421
Network Security is play very important role in Network system, Because in networked systems, the major security risks occur…
Expand
2010
2010
A TRUSTED STORAGE SYSTEM FOR THE CLOUD
Sushama Karumanchi
2010
Corpus ID: 166454190
OF THESIS A TRUSTED STORAGE SYSTEM FOR THE CLOUD Data stored in third party storage systems like the cloud might not be secure…
Expand
2008
2008
A framework for computer forensics investigations involving Microsoft Vista
D. Hayes
,
S. Qureshi
IEEE Long Island Systems, Applications and…
2008
Corpus ID: 16087408
The technical environment continues to change and impact the work of digital investigations. This research provides a framework…
Expand
2008
2008
Mixed Image Element Encryption System
Guiliang Zhu
,
Xiaoqiang Zhang
International Conference for Young Computer…
2008
Corpus ID: 13230548
In view of the lower encryption efficiency or the weaker security of current image encryption technology, on the basis of the…
Expand
2007
2007
Tamper Resistant Network Tracing
Andrew G. Miklas
,
S. Saroiu
,
A. Wolman
,
Angela Demke Brown
ACM Workshop on Hot Topics in Networks
2007
Corpus ID: 15280874
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required