Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors.
Michael HensonStephen TaylorPublished in: ACNS (2013)
Keyphrases
- data confidentiality
- data protection
- information security
- security level
- encryption algorithms
- identity authentication
- security properties
- data security
- data encryption
- high security
- key management
- data quality
- encryption scheme
- encryption decryption
- secret key
- encryption algorithm
- access control
- critical infrastructure
- security analysis
- digital rights management
- image encryption
- protection mechanisms
- key exchange
- data integrity
- virtual private network
- intrusion detection
- stream cipher
- protection scheme
- elliptic curve cryptography
- parallel processing
- network security
- security requirements
- sensitive data
- integrity verification
- main memory
- computer security
- security architecture
- security issues
- privacy protection
- parallel algorithm
- biometric template
- public key cryptography
- smart card
- security mechanisms
- storage systems
- mutual authentication
- data storage
- private key
- cryptographic protocols
- commodity hardware
- data privacy
- personal data
- cryptographic algorithms
- cyber security
- digital signature