Disk encryption

Results: 830



#Item
21Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Analysis of an encrypted HDD J. Czarny, R. Rigo May 11, 2015 Abstract The idea of this presentation is to debunk the myth that analyzing the security of hardware is difficult. From the perspective of a software reverse e

Add to Reading List

Source URL: www.sstic.org

Language: English - Date: 2015-05-26 11:04:26
22The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
23Department of Electrical Engineering and Computer Science  MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
24ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage  Definitions

ENTERPRISE MANAGEMENT! WHAT E? Adding the ‘E’ to FOSS Cryptographic Data Storage Definitions

Add to Reading List

Source URL: rvasec.com

Language: English - Date: 2015-07-01 07:40:04
25: Practical Cryptographic Systems  April 5, 2011 Midterm Instructor: Matthew Green

: Practical Cryptographic Systems April 5, 2011 Midterm Instructor: Matthew Green

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2012-11-01 12:03:04
26Encryption Procedure  Removable Media Encryption – User Guide (Revision Date: Table of Contents

Encryption Procedure Removable Media Encryption – User Guide (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-11-17 11:50:26
27Secure Remote Locking of Device Remote Wiping of Device Setting/Locking DeviceConfigurations Detection of “jail-broken” Devices Enforce Folder and Disk Level Encryption

Secure Remote Locking of Device Remote Wiping of Device Setting/Locking DeviceConfigurations Detection of “jail-broken” Devices Enforce Folder and Disk Level Encryption

Add to Reading List

Source URL: www.emergitech.com

- Date: 2014-10-06 16:55:01
    28VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES  Filming for human rights can be dangerous. It can put you, the people you are filming

    VIDEO AS EVIDENCE: TECH TOOLS TECH TOOLS FOR TRANSFERRING FILES Filming for human rights can be dangerous. It can put you, the people you are filming

    Add to Reading List

    Source URL: librarywebfiles.s3.amazonaws.com

    Language: English - Date: 2015-05-12 14:38:07
    29CP-G10i-Flyer-v10.fh-2 [Converted]

    CP-G10i-Flyer-v10.fh-2 [Converted]

    Add to Reading List

    Source URL: www.cryptophone.de

    Language: English - Date: 2010-02-03 15:53:09
    30cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

    cTPM: A Cloud TPM for Cross-Device Trusted Applications Chen Chen† , Himanshu Raj, Stefan Saroiu, and Alec Wolman Microsoft Research and † CMU Current Trusted Platform Modules (TPMs) are illsuited for use in mobile s

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:12