共 50 条
- [1] Bypassing Full Disk Encryption with Virtual Machine Introspection 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
- [4] Full Disk Encryption: Bridging Theory and Practice TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 241 - 257
- [5] Comparing the Power of Full Disk Encryption Alternatives 2012 INTERNATIONAL GREEN COMPUTING CONFERENCE (IGCC), 2012,
- [6] DATA STORAGE SECURITY AND FULL DISK ENCRYPTION PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 78 - 97
- [7] Research and Design of Virtual Machine Based on User Trusted Security Strategy PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING AND INFORMATION TECHNOLOGY (ICMEIT 2017), 2017, 70 : 408 - 415
- [8] What Users Should Know About Full Disk Encryption Based on LUKS CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 225 - 237
- [9] Design and Research of Virtual Assembly System for Machine Tool based on Maxscript Language 2015 International Conference on Computer Science and Mechanical Automation (CSMA), 2015, : 263 - 266
- [10] Full Disk Encryption: A Comparison on Data Management Attributes 2ND INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2018), 2018, : 39 - 43