Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File EncryptionAn, Sangwoo ; Seo, Seog ChungIEEE access, 2022, Vol.10, p.25349-25357 [Periódico revisado por pares]Piscataway: IEEETexto completo disponível |
|
2 |
Material Type: Artigo
|
Taming energy cost of disk encryption software on data-intensive mobile devicesHu, Yang ; Lui, John C.S. ; Hu, Wenjun ; Ma, Xiaobo ; Li, Jianfeng ; Liang, XiaoFuture generation computer systems, 2020-06, Vol.107, p.681-691 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
|
3 |
Material Type: Artigo
|
Context-Committing Authenticated Encryptions Using Tweakable Stream CipherChang, Donghoon ; Hasan, MunawarIEEE access, 2024, Vol.12, p.84149-84168 [Periódico revisado por pares]IEEETexto completo disponível |
|
4 |
Material Type: Artigo
|
On one Block Cipher Mode of Operation Used to Protect Data on Block-Oriented Storage DevicesGeorgii Firsov ; Alisa KorenevaСовременные информационные технологии и IT-образование, 2022-10, Vol.18 (3), p.691-701 [Periódico revisado por pares]The Fund for Promotion of Internet media, IT education, human development «League Internet MediaTexto completo disponível |
|
5 |
Material Type: Artigo
|
Secure storage—Confidentiality and authenticationBenadjila, Ryad ; Khati, Louiza ; Vergnaud, DamienComputer science review, 2022-05, Vol.44, p.100465, Article 100465Elsevier IncTexto completo disponível |
|
6 |
Material Type: Artigo
|
Adiantum: length-preserving encryption for entry-level processorsPaul Crowley ; Eric BiggersIACR Transactions on Symmetric Cryptology, 2018-01, Vol.2018 (4) [Periódico revisado por pares]Ruhr-Universität BochumTexto completo disponível |
|
7 |
Material Type: Artigo
|
STES: A Stream Cipher Based Low Cost Scheme for Securing Stored DataChakraborty, Debrup ; Mancillas-Lopez, Cuauhtemoc ; Sarkar, PalashIEEE transactions on computers, 2015-09, Vol.64 (9), p.2691-2707 [Periódico revisado por pares]IEEETexto completo disponível |
|
8 |
Material Type: Artigo
|
Implementation of a Parallel XTS Encryption Mode of OperationAlomari, Mohammad AhmedIndian journal of science and technology, 2014-11, Vol.7 (11), p.1813-1819Texto completo disponível |
|
9 |
Material Type: Artigo
|
A Systematic Assessment of the Security of Full Disk EncryptionMuller, Tilo ; Freiling, Felix C.IEEE transactions on dependable and secure computing, 2015-09, Vol.12 (5), p.491-503Washington: IEEETexto completo disponível |
|
10 |
Material Type: Artigo
|
Deceptive Deletion Triggers Under CoercionLianying Zhao ; Mannan, MohammadIEEE transactions on information forensics and security, 2016-12, Vol.11 (12), p.2763-2776 [Periódico revisado por pares]New York: IEEETexto completo disponível |