共 50 条
- [11] What Users Should Know About Full Disk Encryption Based on LUKS [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 225 - 237
- [12] A STUDY ON ENCRYPTION ALGORITHMS AND MODES FOR DISK ENCRYPTION [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 793 - +
- [13] Security notions for disk encryption [J]. COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 455 - 474
- [14] FAST: DISK ENCRYPTION AND BEYOND [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2022, 16 (01) : 185 - 230
- [15] Full Encryption: An end to end encryption mechanism in GaussDB [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2021, 14 (12): : 2811 - 2814
- [17] A Disk Encryption Method Based on SDMS [J]. 2012 INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATION (ICAIC 2012), 2013, : 10 - 15
- [18] GBDE - GEOM based disk encryption [J]. USENIX ASSOCIATION PROCEEDINGS OF BSDCON '03, 2003, : 57 - 68
- [19] Disk-Enabled Authenticated Encryption [J]. 2010 IEEE 26TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2010,
- [20] Extending the selective MPEG encryption algorithm PVEA [J]. IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 117 - +