Disk encryption

Results: 830



#Item
171Data security / Internet privacy / Key escrow / Key / Information security / Secure communication / Clipper chip / Man-in-the-middle attack / Disk encryption / Cryptography / Key management / Public-key cryptography

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

Add to Reading List

Source URL: www.cdt.org

Language: English - Date: 2013-04-29 10:36:57
172Trusted Computing / Trusted Platform Module / Digital signature / Group signature / RSA / Disk encryption / Public key certificate / Cryptography / Public-key cryptography / Direct Anonymous Attestation

On the Design and Implementation of an Efficient DAA Scheme ? Liqun Chen1 , Dan Page2 , and Nigel P. Smart2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 08:44:26
173Security / Computer security / Cryptography / Passphrase / Password / Backup / Remote backup service / Encrypting File System / FileVault / Disk encryption / Cryptographic software / Computing

High Security Online Backup A Cyphertite White Paper February, 2013 Cloud-Based

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
174BitLocker Drive Encryption / FileVault / Cold boot attack / Advanced Encryption Standard / TrueCrypt / Dynamic random-access memory / Data remanence / Computer memory / Key / Cryptography / Disk encryption / Cryptographic software

Lest We Remember: Cold-Boot Attacks on Encryption Keys

Add to Reading List

Source URL: jhalderm.com

Language: English - Date: 2014-12-24 15:14:38
175Cryptographic software / Disk encryption / Cryptography / Key management / Key

How it works. High Security Online Backup A simple overview of how Cyphertite safely & securely guards your data.

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-02-11 17:33:51
176Key management / Cryptographic protocols / Passphrase / Password / PBKDF2 / Crypt / Key / Transport Layer Security / Encrypting File System / Cryptography / Cryptographic software / Disk encryption

High Security Online Backup A Cyphertite White Paper February, 2013 Cryptography

Add to Reading List

Source URL: www.cyphertite.com

Language: English - Date: 2013-03-25 09:52:17
177Data security / Cryptographic software / Security / Computer security / Email / Encryption / S/MIME / Backup / Password / Cryptography / Disk encryption / Computing

ISSG-14-11_Information_Handling_Guidelines_1_0

Add to Reading List

Source URL: as.exeter.ac.uk

Language: English - Date: 2015-05-22 07:15:56
178Computers and the environment / Disk encryption / Intel Atom / Power management / LEAP / Server / Intel / Benchmark / Nvidia Ion / Computing / Computer hardware / System software

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H. Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher {pahp, reiher}@cs.ucla.edu {, kaiser@ee.u

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2011-12-02 17:59:03
179BIOS / Booting / Trusted computing / Trusted Platform Module / Cryptography / Disk encryption / Network booting / Rootkit / Preboot Execution Environment / Computer security / Computing / System software

Trusted Disk Loading in the Emulab Network Testbed Cody Cutler University of Utah, School of Computing www.emulab.net Abstract

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2012-08-12 13:04:25
180Tunneling protocols / Data / Network architecture / IPsec / Advanced Encryption Standard / Disk encryption / Cryptography / Cryptographic protocols / Internet protocols

USER CASE REDEFINING SECURITY Global Bank IDQ Secures Global Wide Area Network Multipoint 100 Megabit Ethernet Encryption

Add to Reading List

Source URL: www.idquantique.com

Language: English - Date: 2015-03-23 10:17:12
UPDATE