Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Filesystem-level encryption

Known as: File/folder encryption, Cryptographic filesystem, Cyptographic file system 
Filesystem-level encryption, often called file/folder encryption, is a form of disk encryption where individual files or directories are encrypted by… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Big Data is a term applied to data sets whose size is beyond the ability of traditional software technologies to capture, store… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Highly Cited
2007
Highly Cited
2007
Many threats against end user devices, such as desktop and laptop computers, smart phones, personal digital assistants, and… Expand
Highly Cited
2006
Highly Cited
2006
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.- Timing Analysis in Low-Latency Mix Networks: Attacks and… Expand
2005
2005
A crucial element of distributed cryptographic file systems are key management solutions that allow for flexible but secure data… Expand
Highly Cited
2003
Highly Cited
2003
This paper presents SiRiUS, a secure file system designed to be layered over insecure network and P2P file systems such as NFS… Expand
  • figure 1
  • figure 3
  • figure 4
  • table 2
  • figure 5
Highly Cited
2003
Highly Cited
2003
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 4
Highly Cited
2001
Highly Cited
2001
The Cooperative File System (CFS) is a new peer-to-peer read-only storage system that provides provable guarantees for the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
1999
Highly Cited
1999
Cryptographic file systems provide little protection against legal or illegal instruments that force the owner of data to release… Expand
  • figure 1
  • figure 2
Highly Cited
1994
Highly Cited
1994
  • M. Blaze
  • USENIX Summer
  • 1994
  • Corpus ID: 12627461
As distributed computing systems grow in size, complexity and variety of application, the problem of protecting sensitive data… Expand
  • figure 1
  • figure 2
Highly Cited
1993
Highly Cited
1993
Although cryptographic techniques are playing an increasingly important role in modern computing system security, user-level… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4