| Document Date: 2008-07-16 12:26:51 Open Document File Size: 265,95 KBShare Result on Facebook
Company Adobe / Deniable File Systems / Google / Computer Information Systems / Needham / Microsoft / The Guardian / / Country United States / / IndustryTerm sense that these applications / free data recovery tool / open-source disk-encryption software package / desktop search applications / disk-encryption software meets / disk encryption systems / open source systems / file systems / non-primary applications / nonprimary applications / mountable file systems / malicious applications / circulated applications / encrypted file systems / Less robust applications / desktop search application / decryption algorithms / media discussions / security protocols / difficultly following security protocols / / Movie Declaration of Independence / / OperatingSystem Windows Vista / UNIX / Mac OS X / Linux / Windows Vista Business / Microsoft Windows / Microsoft Vista / / Organization Univ. of Washington / U.S. Securities and Exchange Commission / Electronic Frontier Foundation / / Person Karl Koscher∗ Tadayoshi Kohno / David J. St. Hilaire / Tadayoshi Kohno∗ Abstract Bruce / / Position human-rights worker / federal law enforcement officer / customs officer / / PublishedMedium The Guardian / / Technology Linux / UNIX / disk encryption / cloning / security protocols / operating system / decryption algorithms / operating systems / anti-virus software / encryption / TrueCrypt encryption / http / caching / / URL http /
SocialTag |