Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

TrueCrypt

Known as: True Crypt, TC, TruCrypt 
TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Ransomware encrypts user files making management of the encryption key(s) critical to its success. Developing a better… Expand
  • figure 1
  • figure 2
  • table I
  • figure 4
2017
2017
Previous work has demonstrated that systems with unencrypted DRAM interfaces are susceptible to cold boot attacks – where the… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
2017
2017
Exploratory Wayfinding in Wide Field Ethnography 
  • figure 3
  • table 1
  • figure 4
  • table 2
  • figure 5
2016
2016
Forensic investigations of digital devices is generally conducted on a seized device in a secure environment. This usually… Expand
  • table 1
  • table 2
  • table 3
  • table 4
2013
2013
We present Lyra, a password-based key derivation scheme based on cryptographic sponges. Lyra was designed to be strictly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
2013
2013
Privacy has become an issue of paramount importance for many users. As a result, encryption tools such as True Crypt, OS-based… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Highly Cited
2013
Highly Cited
2013
From the perspective of data security, which has always been an important aspect of quality of service, Cloud computing focuses a… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
2012
2012
Software-based disk encryption techniques store necessary keys in main memory and are therefore vulnerable to DMA and cold boot… Expand
  • figure 1
  • table 1
2010
2010
Cryptographic (or end-to-end) election verification is a promising approach to providing transparent elections in an age of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
2010
2010
  • Quan-xing Miao
  • The 2nd International Conference on Information…
  • 2010
  • Corpus ID: 17407607
Disk encryption is a special case of data at rest protection when the storage media is a sector-addressable device such as a hard… Expand