Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,844,070 papers from all fields of science
Search
Sign In
Create Free Account
Disk encryption
Known as:
Hard-disk encryption
, Whole Disc Encryption
, Full-disk encryption
Expand
Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Accounts & SSO
Authenticated encryption
Authentication
BitLocker
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Single Packet Authorization in a Multi-Layered Security Architecture
Mohammad Mirheydari
,
P. Zavarsky
,
S. Butakov
Biennial Symposium on Communications
2018
Corpus ID: 53017770
Single Packet Authorization (SPA) is a concealment method that hides the open ports, devices, and network components behind a…
Expand
2017
2017
Chapter 5 – Data Hiding Using Encryption Techniques
Nihad A. Hassan
2017
Corpus ID: 64199727
2015
2015
Selecting a New Key Derivation Function for Disk Encryption
Milan Broz
,
Vashek Matyáš
International Workshop on Security and Trust…
2015
Corpus ID: 37890103
Many full disk encryption applications rely on a strong password-based key derivation function to process a passphrase. This…
Expand
2013
2013
Client-Controlled Cryptography-as-a-Service in the Cloud
Sören Bleikertz
,
Sven Bugiel
,
Hugo Ideler
,
S. Nürnberger
,
A. Sadeghi
International Conference on Applied Cryptography…
2013
Corpus ID: 11950983
Today, a serious concern about cloud computing is the protection of clients' data and computations against various attacks from…
Expand
2012
2012
Data Tethers: Preventing information leakage by enforcing environmental data access policies
Charles Fleming
,
P. Peterson
,
Erik Kline
,
P. Reiher
IEEE International Conference on Communications…
2012
Corpus ID: 15465614
Protecting data from accidental loss or theft is crucial in today's world of mobile computing. Data Tethers provides flexible…
Expand
2011
2011
Ensemble of Trusted Firmware Services based on TPM
Zhenlong Du
,
Xiaoli Li
,
Yanwen Guo
,
Kangkang Shen
2011
Corpus ID: 57952958
Firmware directly drives hardware, and vulnerable firmware might lead to the operating system crash. As firmware faces the…
Expand
2010
2010
Evil maid goes after PGP whole disk encryption
A. Tereshkin
International Conference on Security of…
2010
Corpus ID: 29070358
Full disk encryption systems are widely used to protect the information from unauthorized access. A common application of such…
Expand
2010
2010
A network disk encryption with dynamic encryption key
Lin Feng
,
Hongji Piao
,
Hao Ling
,
Bo Jin
International Conference On Computer Design and…
2010
Corpus ID: 13925432
The safety problem of network storage is much more important than accessibility and usability. In this paper, we present a novel…
Expand
2008
2008
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
P. Sarkar
2008
Corpus ID: 1396403
A new multi-linear universal hash family is described. Messages are sequences over a finite field IFq while keys are sequences…
Expand
2007
2007
Discryption: Internal Hard-Disk Encryption for Secure Storage
L. Hars
Computer
2007
Corpus ID: 6395138
There have been many recent cases of information getting into unauthorized hands from lost or stolen laptops or insiders…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE