NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4
zadetkov: 31
1.
  • Secure storage—Confidential... Secure storage—Confidentiality and authentication
    Benadjila, Ryad; Khati, Louiza; Vergnaud, Damien Computer science review, 20/May , Letnik: 44
    Journal Article
    Odprti dostop

    Secure disk storage is a rich and complex topic and its study is challenging in theory as well as in practice. In case of loss or theft of mobile devices (such as laptops and smartphones), the threat ...
Celotno besedilo
2.
  • Designing a New XTS-AES Par... Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption
    An, Sangwoo; Seo, Seog Chung IEEE access, 2022, Letnik: 10
    Journal Article
    Recenzirano
    Odprti dostop

    XTS-AES is a disk encryption mode of operation that uses the block cipher AES. Several studies have been conducted to improve the encryption speed using XTS-AES according to the increasing disk size. ...
Celotno besedilo

PDF
3.
Celotno besedilo

PDF
4.
  • Deceptive Deletion Triggers... Deceptive Deletion Triggers Under Coercion
    Lianying Zhao; Mannan, Mohammad IEEE transactions on information forensics and security, 12/2016, Letnik: 11, Številka: 12
    Journal Article
    Recenzirano

    For users in possession of password-protected encrypted data in persistent storage (i.e., "data at rest"), an obvious problem is that the password may be extracted by an adversary through dictionary ...
Celotno besedilo
5.
  • A Systematic Assessment of ... A Systematic Assessment of the Security of Full Disk Encryption
    Muller, Tilo; Freiling, Felix C. IEEE transactions on dependable and secure computing, 2015-Sept.-Oct.-1, 2015-9-1, 20150901, Letnik: 12, Številka: 5
    Journal Article

    Organizations as well as private users frequently report the loss and theft of mobile devices such as laptops and smartphones. The threat of data exposure in such scenarios can be mitigated by ...
Celotno besedilo
6.
Celotno besedilo

PDF
7.
  • The impact of full disk enc... The impact of full disk encryption on digital forensics
    Casey, Eoghan; Stellatos, Gerasimos J. Operating systems review, 04/2008, Letnik: 42, Številka: 3
    Journal Article

    The integration of strong encryption into operating systems is creating challenges for forensic examiners, potentially preventing us from recovering any digital evidence from a computer. Because ...
Celotno besedilo
8.
  • Implementing and Optimizing... Implementing and Optimizing an Encryption Filesystem on Android
    Zhaohui Wang; Murmuria, R.; Stavrou, A. 2012 IEEE 13th International Conference on Mobile Data Management, 2012-July
    Conference Proceeding

    The recent surge in popularity of smart handheld devices, including smart-phones and tablets, has given rise to new challenges in protection of Personal Identifiable Information (PII). Indeed, modern ...
Celotno besedilo
9.
Celotno besedilo
10.
Celotno besedilo
1 2 3 4
zadetkov: 31

Nalaganje filtrov