DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Disk encryption software
Disk encryption software
Mobiceal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices
PV204: Disk Encryption Lab
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Ensuring Data Confidentiality Via Plausibly Deniable Encryption and Secure Deletion – a Survey Qionglu Zhang1,2,3, Shijie Jia1,2*, Bing Chang4 and Bo Chen5*
Mobiflage: Deniable Storage Encryption for Mobile Devices 3
Mobihydra: Pragmatic and Multi-Level Plausibly Deniable Encryption Storage for Mobile Devices?
Winter 2016 E-Newsletter
Introduction to Truecrypt
Comparison of Disk Encryption Software 1 Comparison of Disk Encryption Software
Free Windows File Encryption Software
Cold Boot Attacks on Encryption Keys
Veracryptcrypt F R E E O P E N - S O U R C E O N - T H E - F L Y E N C R Y P T I O N User’S Guide
Disk Encryption
Analysing Android's Full Disk Encryption Feature
Technical Report
Encrypted Disk Unmount Using Personalized Audio Instruction
Symantec White Paper
Veracrypt Audit
Top View
Taming Energy Cost of Disk Encryption Software on Data
Defeating Encrypted and Deniable File Systems: Truecrypt V5.1A and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J
Truecrypt.Org
OFORK: FAQ#1000219 / Tool to Encrypt Data Or Volumes
Weaknesses in the Encryption of Solid State Drives
IRMAT Pharmacy & Jetico Success Story
Truecrypt User Guide
On Implementing Deniable Storage Encryption for Mobile Devices
Security of Hard Disk Encryption
Towards Designing a Secure Plausibly Deniable System for Mobile Devices Against Multi-Snapshot Adversaries - a Preliminary Design
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives (Ssds)
Mobipluto: File System Friendly Deniable Storage for Mobile Devices
A Computer Forensic Response to Hard Drive Encryption
Implementing Plausibly Deniable Encryption in Flash Translation Layer
Security Through Amnesia: a Software-Based Solution to the Cold Boot Attack on Disk Encryption
Encryption Overview: Full Disk Encryption (FDE) File/Folder
Hardware Mechanisms for Efficient Memory System Security
Veracrypt.Codeplex.Com
Security of Hard Disk Encryption
TRESOR Runs Encryption Securely Outside RAM
How Whole Disk Encryption Works a PGP Corporation White Paper
Lest We Remember: Cold-Boot Attacks on Encryption Keys by J
A Problem Solving Approach to Enterprise Filevault 2 Management and Integration Nicholas Cobb Western Kentucky University,
[email protected]
Understanding Disk Encryption and Macrium Reflect
Guide to Storage Encryption for End User Devices