A Systematic Assessment of the Security of Full Disk Encryption.
Tilo MüllerFelix C. FreilingPublished in: IEEE Trans. Dependable Secur. Comput. (2015)
Keyphrases
- encryption algorithms
- security properties
- encryption decryption
- key management
- encryption scheme
- high security
- data encryption
- identity authentication
- key exchange
- security analysis
- digital rights management
- encryption algorithm
- security level
- virtual private network
- secret key
- security requirements
- elliptic curve cryptography
- information security
- integrity verification
- risk assessment
- stream cipher
- public key cryptography
- access control
- main memory
- security policies
- intrusion detection
- image encryption
- statistical databases
- iso iec
- ad hoc networks
- network security
- security protocols
- authentication protocol
- cryptographic protocols
- network management
- security issues
- data confidentiality
- mutual authentication
- resource constrained
- data protection
- data structure