Disk encryption

Results: 830



#Item
31Non-volatile memory / Disk encryption / Data erasure / Data management / Computer security / Data remanence / Disk formatting / Shred / File deletion / Parallel ATA / USB flash drive / Data recovery

Microsoft Word - DataSanitizeTutorial121206b.doc

Add to Reading List

Source URL: tomcoughlin.com

Language: English - Date: 2007-01-10 11:18:02
32Computers and the environment / Computer performance / Standard Performance Evaluation Corporation / Power management / Disk encryption / Atom / Benchmark / OpenSUSE / Operating system / Run-time estimation of system and sub-system level power consumption

Investigating Energy and Security Trade-offs in the Classroom With the Atom LEAP Testbed Peter A. H. Peterson, Digvijay Singh, William J. Kaiser, Peter L. Reiher {pahp, reiher}@cs.ucla.edu ,

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:25
33Reconfigurable computing / Fabless semiconductor companies / Field-programmable gate array / Disk encryption / Xilinx / Altera / Virtex / Bitstream / Data Encryption Standard / Galois/Counter Mode / Encryption / BitLocker

Compact and On-the-Fly Secure Dynamic Reconfiguration for Volatile FPGAs HIRAK KASHYAP and RICARDO CHAVES, INESC-ID, IST, Universidade de Lisboa The dynamic partial reconfiguration functionality of FPGAs can be attacked,

Add to Reading List

Source URL: www.inesc-id.pt

Language: English - Date: 2016-02-23 14:14:05
34Password / Security / Disk encryption / Login / Password manager / Security and safety features new to Windows Vista

Drive Encryption Procedure End User Documentation: First Time Login (Revision Date: Table of Contents

Add to Reading List

Source URL: supportcenter.ct.edu

Language: English - Date: 2014-05-16 15:09:57
35Computer access control / Public-key cryptography / Identity management / Mobile signature / Signature / Security token / Public key infrastructure / Authentication / 3-D Secure / Electronic authentication / Disk encryption

Keyhub_Product_Overview_28

Add to Reading List

Source URL: www.iquestgroup.com

Language: English - Date: 2016-05-10 04:15:28
36Data Encryption Standard / Key size / Cryptographic protocols / Cryptographic software / Disk encryption / Index of cryptography articles / IPsec

CP-G10i-Flyer-v10.fh-2 [Converted]

Add to Reading List

Source URL: www.cryptophone.de

Language: English - Date: 2010-10-15 13:48:57
37Cross-platform software / Cryptographic software / Discontinued software / Disk encryption / TrueCrypt / PING / Email / Outlook.com

Click  Collec)on  System  Dataset  Request  Form Please  use  this  form  when  reques2ng  a  copy  of  the  Click  Collec2on  System  Dataset  from  the  IU

Add to Reading List

Source URL: carl.cs.indiana.edu

Language: English - Date: 2013-05-28 14:48:39
38Disk encryption theory / Cryptography / Block cipher / Advantage / Stream ciphers / Cipher / Vigenre cipher / Format-preserving encryption

A Parallelizable Enciphering Mode Shai Halevi∗ Phillip Rogaway† June 17, 2003

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:29
39Hacking / Disk encryption / Cryptographic software / Inode / HTTP cookie / JavaScript / BitLocker / Cross-site scripting / Vulnerability / Encrypted filesystem / Encryption / Stat

Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2016-01-29 11:50:05
40Disk encryption / Cryptographic software / Cryptography / NTFS / Windows Vista / Encryption / Encrypting File System / Windows / Security and safety features new to Windows Vista

  File-encryption tool secureEFS

Add to Reading List

Source URL: www.a-sit.at

Language: English - Date: 2006-10-11 09:39:11
UPDATE