Extending Full Disk Encryption for the Future

被引:0
|
作者
Broz, Milan [1 ,2 ]
机构
[1] Masaryk Univ, Fac Informat, Brno, Czech Republic
[2] Red Hat Czech, Brno, Czech Republic
来源
SECURITY PROTOCOLS XXV | 2017年 / 10476卷
关键词
D O I
10.1007/978-3-319-71075-4_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:109 / 115
页数:7
相关论文
共 50 条
  • [31] Extending fibrations of knot complements to ribbon disk complements
    Miller, Maggie
    [J]. GEOMETRY & TOPOLOGY, 2021, 25 (03) : 1479 - 1550
  • [32] Performance study of selective encryption in comparison to full encryption for still visual images
    Osama A.KHASHAN
    Abdullah M.ZIN
    Elankovan A.SUNDARARAJAN
    [J]. Frontiers of Information Technology & Electronic Engineering, 2014, (06) : 435 - 444
  • [33] Efficient Disk Encryption and Verification through Trusted Nonce
    Hou, Fangyong
    Gu, Dawu
    Xiao, Nong
    Cai, Zhiping
    [J]. 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 82 - 87
  • [34] Disk encryption: do we need to preserve length?
    Debrup Chakraborty
    Cuauhtemoc Mancillas López
    Palash Sarkar
    [J]. Journal of Cryptographic Engineering, 2018, 8 : 49 - 69
  • [35] Performance study of selective encryption in comparison to full encryption for still visual images
    Osama A. Khashan
    Abdullah M. Zin
    Elankovan A. Sundararajan
    [J]. Journal of Zhejiang University SCIENCE C, 2014, 15 : 435 - 444
  • [36] Performance study of selective encryption in comparison to full encryption for still visual images
    Khashan, Osama A.
    Zin, Abdullah M.
    Sundararajan, Elankovan A.
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2014, 15 (06): : 435 - 444
  • [37] An implementation and evaluation of online disk encryption for windows systems
    Singh, Vartika
    Lakshminarasimhaiah, D. R.
    Mishra, Yogesh
    Viswanathan, Chitra
    Athithan, G.
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 337 - +
  • [38] A New Narrow Block Mode of Operations for Disk Encryption
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 126 - 131
  • [39] Disk encryption: do we need to preserve length?
    Chakraborty, Debrup
    Mancillas Lopez, Cuauhtemoc
    Sarkar, Palash
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (01) : 49 - 69
  • [40] Selecting a New Key Derivation Function for Disk Encryption
    Broz, Milan
    Matyas, Vashek
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2015), 2015, 9331 : 185 - 199