DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Deniable encryption
Deniable encryption
Mobiceal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
A Plausibly Deniable Encryption Scheme for Personal Data Storage Andrew Brockmann Harvey Mudd College
Ensuring Data Confidentiality Via Plausibly Deniable Encryption and Secure Deletion – a Survey Qionglu Zhang1,2,3, Shijie Jia1,2*, Bing Chang4 and Bo Chen5*
Mobiflage: Deniable Storage Encryption for Mobile Devices 3
Deniable Encryption Protocols Based on Probabilistic Public-Key Encryption
Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
Deniable Encryption with Negligible Detection Probability: an Interactive Construction
Uncoercible Communication and Deniable Encryption, Or How to Lie with Impunity
Mobigyges: a Mobile Hidden Volume for Preventing Data Loss, Improving Storage Utilization, and Avoiding Device Reboot
CS 5472 - Advanced Topics in Computer Security
Multi-Party Off-The-Record Messaging
Multi-Party Off-The-Record Messaging
Artifice: a Deniable Steganographic File System
Message Franking Via Committing Authenticated Encryption∗
Ensuring Data Confidentiality Via Plausibly Deniable Encryption And
On the Relationship Between Weak and Strong Deniable Authenticated Encryption
A Method for Obtaining Deniable Public-Key Encryption
Bi-Deniable Public-Key Encryption
Top View
Secure Messaging1
Deniable Encryption with Negligible Detection Probability: an Interactive Construction
View the Index
Off-The-Record Secure Chat Room
Deniable Storage Encryption for Mobile Devices
Deniable Encryption*
Threat Models for Analyzing Plausible Deniability of Deniable File Systems
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
An Implementation of Deniable Encryption Ari Trachtenberg
[email protected]
Deniable-Encryption Protocols Based on Commutative Ciphers 1. Introduction
Deniable Authentication and Key Exchange
A Standards for Authentication and Key Establishment
Deniable Liaisons
Deniable Encryption⋆
Deniable Messaging Under Strong Surveillance
Towards Designing a Secure Plausibly Deniable System for Mobile Devices Against Multi-Snapshot Adversaries - a Preliminary Design
Deniable Key Exchanges for Secure Messaging
Mobipluto: File System Friendly Deniable Storage for Mobile Devices
Implementing Plausibly Deniable Encryption in Flash Translation Layer
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Deniable Encryption
Defeating Plausible Deniability of Veracrypt Hidden Operating Systems
Secure Messaging1
Bestcrypt Truecrypt Comparison Chart
Deniable Functional Encryption
Threat Models for Analyzing Plausible Deniability of Deniable File Systems
Compelled Decryption and the Fifth Amendment: Exploring the Technical Boundaries
A Deniable File System for Flash Memory
Plausible Deniability for Android
Cryptanalysis on Deniable Encryption
The Impact of Attestation on Deniable Communications Title