Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Disk encryption

Known as: Hard-disk encryption, Whole Disc Encryption, Full-disk encryption 
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
As recently shown by attacks against Android-driven smart phones, ARM devices are vulnerable to cold boot attacks. At the end of… Expand
Is this relevant?
2013
2013
Today, a serious concern about cloud computing is the protection of clients' data and computations against various attacks from… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Current disk encryption techniques store necessary keys in RAM and are therefore susceptible to attacks that target volatile… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Disk encryption has become an important security measure for a multitude of clients, including governments, corporations… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Full disk encryption systems are widely used to protect the information from unauthorized access. A common application of such… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Contrary to widespread assumption, dynamic RAM (DRAM), the main memory in most modern computers, retains its contents for several… Expand
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2007
2007
  • L. Hars
  • Computer
  • 2007
  • Corpus ID: 6395138
There have been many recent cases of information getting into unauthorized hands from lost or stolen laptops or insiders… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
This work investigates the state of the art in hard disk cryptography. As the choice of the cipher mode is essential for the… Expand
  • table 2.5
  • figure 2.6
  • table 2.7
  • figure 2.8
  • table 2.11
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
We present the design and implementation of CGD, the CryptoGraphic Disk driver. CGD is a pseudo-device driver that sits below the… Expand
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?