Disk encryption

Results: 830



#Item
1Cryptography / Disk encryption / Cryptographic software / Dm-crypt / Symmetric-key algorithm / Comparison of disk encryption software / AES implementations

E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

Add to Reading List

Source URL: www.emscb.de

Language: English - Date: 2011-05-11 05:57:21
2

New Methods in Hard Disk Encryption Clemens Fruhwirth <> Institute for Computer Languages Theory and Logic Group Vienna University of Technology

Add to Reading List

Source URL: tomb.dyne.org

- Date: 2011-01-28 17:33:02
    3

    Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary University of Cambridge Felix Gr¨obert ∗

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2012-07-21 17:47:00
      4System software / Software / Disk encryption / Cryptography / Cryptographic software / Ransomware / Computer virus / Deception / Internet security / Encryption / Antivirus software / Linux.Encoder.1

      How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. 1. Download RannohDec

      Add to Reading List

      Source URL: www.nomoreransom.org

      Language: English - Date: 2016-07-25 04:33:34
      5Computer data storage / Computer hardware / Computing / Computer storage devices / Computer storage media / Non-volatile memory / Disk encryption / Hard disk drives / Solid-state drive / Hardware-based full disk encryption / Seagate Technology / Sed

        Self-­‐Encrypting  Drive  Market  and  Technology  Report—Coughlin  Associates     Self-Encrypting Drive Market and Technology

      Add to Reading List

      Source URL: tomcoughlin.com

      Language: English - Date: 2015-04-12 23:07:47
      6Special functions / Disk encryption theory / XEX / Rectangular function

      Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Phillip Rogaway ∗

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      Language: English - Date: 2006-12-11 12:04:14
      7Computer data storage / Hard disk drives / Computer hardware / Computer storage devices / Seagate Technology / Computing / Hardware-based full disk encryption

      Savvio 10K.6 ® Data Sheet Enterprise Performance 10K HDD—The Perfect Performance Upgrade

      Add to Reading List

      Source URL: www.seagate.com

      Language: English - Date: 2013-12-24 11:11:58
      8Computing / Security / Cryptography / Crime prevention / Information governance / National security / Disk encryption / Computer security / Encryption / Android / Information security / USB flash drive

      Desktop, Laptop, and Portable Device DRAFT - Data Classification System Requirements September 12, 2013 Purpose of this document This document outlines and provides an explanation for some of the most important and possi

      Add to Reading List

      Source URL: facultysenate.mst.edu

      Language: English - Date: 2014-01-22 04:21:56
      9Disk encryption / Cryptography / Cryptographic software / Hardware-based full disk encryption / Advanced Encryption Standard / USB flash drive / USB / Encryption / BitLocker

      Microsoft Word - X-Wall DX_FAQ_v1.1.doc

      Add to Reading List

      Source URL: www.enovatech.net

      Language: English - Date: 2013-11-21 01:52:00
      10Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

      Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

      Add to Reading List

      Source URL: www.commoncriteriaportal.org

      Language: English - Date: 2015-03-09 11:24:03
      UPDATE