Sign in

Filesystem Encryption or Direct-Access for NVM Filesystems? Let's Have Both!

Kazi Abu ZubairDavid MohaisenAmro Awad
Published in: HPCA (2022)
Keyphrases
  • access control
  • databases
  • genetic algorithm
  • information systems
  • wireless networks
  • random access
  • key management
  • encryption algorithms