Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,716,018 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption
Known as:
Hard-disk encryption
, Whole Disc Encryption
, Full-disk encryption
Expand
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Accounts & SSO
Authenticated encryption
Authentication
BitLocker
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Cryptanalysis of Simpira
Christoph Dobraunig
,
Maria Eichlseder
,
Florian Mendel
IACR Cryptology ePrint Archive
2016
Corpus ID: 17923276
Simpira is a recently proposed family of permutations, based on the AES round function. The design includes recommendations for…
Expand
2012
2012
Data Tethers: Preventing information leakage by enforcing environmental data access policies
Charles Fleming
,
P. Peterson
,
Erik Kline
,
P. Reiher
IEEE International Conference on Communications…
2012
Corpus ID: 15465614
Protecting data from accidental loss or theft is crucial in today's world of mobile computing. Data Tethers provides flexible…
Expand
2012
2012
Undecryptable Encryption against Network and Forensic Attack
Raana Syeda
,
S. Nimbhorkar
2012
Corpus ID: 61618501
Cryptography plays a vital role in data security. It is necessary where the integrity and confidentiality of information is…
Expand
2011
2011
Filter drive encryption implementing method for file system
孙力娟
,
张伟
,
+4 authors
黄海平
2011
Corpus ID: 58844108
The invention discloses a filter drive encryption implementing method for a file system. The encryption method comprises the…
Expand
2010
2010
Evil maid goes after PGP whole disk encryption
A. Tereshkin
International Conference on Security of…
2010
Corpus ID: 29070358
Full disk encryption systems are widely used to protect the information from unauthorized access. A common application of such…
Expand
2010
2010
A network disk encryption with dynamic encryption key
Lin Feng
,
Hongji Piao
,
Hao Ling
,
Bo Jin
International Conference On Computer Design and…
2010
Corpus ID: 13925432
The safety problem of network storage is much more important than accessibility and usability. In this paper, we present a novel…
Expand
Review
2009
Review
2009
Disk Encryption: Scrutinizing IEEE Standard 1619XTS-AES
Adnan Alam
2009
Corpus ID: 60383212
Disk encryption has changed during the last decade from being a mechanism only used by corporate executives and government…
Expand
2008
2008
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
P. Sarkar
2008
Corpus ID: 1396403
A new multi-linear universal hash family is described. Messages are sequences over a finite field IFq while keys are sequences…
Expand
2008
2008
IMPLEMENTASI DISK ENCRYPTION MENGGUNAKAN ALGORITMA RIJNDAEL
Elfira Yolanda Sinaga
2008
Corpus ID: 60197678
Data dapat menjadi salah satu aset penting dalam kelangsungan hidup perusahaan mana pun. Tugas akhir ini mengimplementasikan…
Expand
2007
2007
Application of Hard Disk Encryption System in Information Security
D. Zibin
2007
Corpus ID: 63560545
From the hard disk encryption system of study back and status in quo of national and foreign,the elements of harddisk encryption…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE