-
2
-
-
84947196743
-
Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications
-
A. Czeskis et al., "Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications," 3rd USENIX HotSec, 2008.
-
(2008)
3rd USENIX HotSec
-
-
Czeskis, A.1
-
3
-
-
78651515990
-
-
2009, accessed Tuesday, October 20th, 2009
-
G. Moore, "Intel Museum - Moore's Law," http://www.intel.com/ museum/archives/history-docs/mooreslaw.htm, 2009, accessed Tuesday, October 20th, 2009.
-
Intel Museum - Moore's Law
-
-
Moore, G.1
-
4
-
-
77955989710
-
-
1368-7.html, 2008, accessed Sunday, October 18th 2009
-
P. Schmid, "15 Years of Hard Drive History: Capacities Outran Performance," http://www.tomshardware.com/reviews/15-years-of-hard-drive- history, 1368-7.html, 2008, accessed Sunday, October 18th 2009.
-
15 Years of Hard Drive History: Capacities Outran Performance
-
-
Schmid, P.1
-
7
-
-
78651496311
-
-
2009, accessed Tuesday, October 20th, 2009
-
N. Moller, "Nettle - a low-level cryptographic library," http://www.lysator.liu.se/~nisse/nettle/nettle.html, 2009, accessed Tuesday, October 20th, 2009.
-
Nettle - A Low-level Cryptographic Library
-
-
Moller, N.1
-
8
-
-
62749096566
-
Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms
-
N. El-Fishawy and O. M. A. Zaid, "Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms," International Journal of Network Security, 2007.
-
(2007)
International Journal of Network Security
-
-
El-Fishawy, N.1
Zaid, O.M.A.2
-
10
-
-
78651476158
-
Performance of symmetric ciphers and one-way hash functions
-
Springer Berlin/Heidelberg
-
M. Roe, "Performance of symmetric ciphers and one-way hash functions," in Fast Software Encryption, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 1995, pp. 359-362.
-
(1995)
Fast Software Encryption, Ser. Lecture Notes in Computer Science
, pp. 359-362
-
-
Roe, M.1
-
12
-
-
78651488262
-
-
Various accessed Tuesday, October 20th, 2009
-
Various, "The Linux Desktop Testing Project," http://ldtp.freedesktop.org/wiki/, accessed Tuesday, October 20th, 2009.
-
The Linux Desktop Testing Project
-
-
-
14
-
-
78651473598
-
-
Various 2001, accessed Monday, October 19th, 2009
-
Various, http://lkml.indiana.edu/hypermail/linux/kernel/0104.2/0282.html, 2001, accessed Monday, October 19th, 2009.
-
-
-
-
15
-
-
78651505015
-
-
Trusted Computing Group, "TPM Main Specification 1.2," http://www.trustedcomputinggroup.org/resources/tpm-main-specification.
-
TPM Main Specification 1.2
-
-
-
16
-
-
84948973494
-
Exposure-resilient functions and all-or-nothing transforms
-
R. Canetti et al., "Exposure-Resilient Functions and All-or-Nothing Transforms," EUROCRYPT 2000, LNCS 1807, 2000.
-
(2000)
EUROCRYPT 2000, LNCS 1807
-
-
Canetti, R.1
-
20
-
-
0004196480
-
-
(PhD Thesis) Ph.D. dissertation, School of Computer Science, Carnegie Mellon University
-
-, "Using Secure Coprocessors (PhD Thesis)," Ph.D. dissertation, School of Computer Science, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
-
22
-
-
84957086893
-
How to forget a secret
-
(extended abstract)
-
G. D. Crescenzo et al., "How to forget a secret (extended abstract)," STACS'99, LNCS 1563, 1999.
-
(1999)
STACS'99, LNCS 1563
-
-
Crescenzo, G.D.1
-
24
-
-
41549090527
-
Memory predecryption: Hiding the latency overhead of memory encryption
-
B. Rogers et al., "Memory predecryption: hiding the latency overhead of memory encryption," SIGARCH Comput. Archit. News, vol. 33, no. 1, pp. 27-33, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.1
, pp. 27-33
-
-
Rogers, B.1
|