From post

Practical Cryptographic Data Integrity Protection with Full Disk Encryption.

, , и . SEC, том 529 из IFIP Advances in Information and Communication Technology, стр. 79-93. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On Secrecy Amplification Protocols., , и . WISTP, том 9311 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2015)An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications., и . LightSec, том 8162 из Lecture Notes in Computer Science, стр. 81-96. Springer, (2013)Selecting a New Key Derivation Function for Disk Encryption., и . STM, том 9331 из Lecture Notes in Computer Science, стр. 185-199. Springer, (2015)Practical Cryptographic Data Integrity Protection with Full Disk Encryption., , и . SEC, том 529 из IFIP Advances in Information and Communication Technology, стр. 79-93. Springer, (2018)The Million-Key Question - Investigating the Origins of RSA Public Keys., , , , , , и . USENIX Security Symposium, стр. 893-910. USENIX Association, (2016)Want to Raise Cybersecurity Awareness? Start with Future IT Professionals., , , , , и . ITiCSE (1), стр. 236-242. ACM, (2023)Reconsidering Attacker Models in Ad-Hoc Networks., , и . Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 219-227. Springer, (2016)A Protocol for Intrusion Detection in Location Privacy-Aware Wireless Sensor Networks., и . TrustBus, том 8647 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2014)Randomness Testing: Result Interpretation and Speed., и . The New Codebreakers, том 9100 из Lecture Notes in Computer Science, стр. 389-395. Springer, (2016)Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions., , , , и . SECRYPT, стр. 134-146. SCITEPRESS, (2022)