We define security goals and attack models for disk encryption, and prove several results for the resulting security notions, as well as some relationships. We give concrete constructions for every security notion along with security proofs. We briefly discuss the security of some implementations and standards for disk encryption. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Gjøsteen, K. (2005). Security notions for disk encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3679 LNCS, pp. 455–474). Springer Verlag. https://doi.org/10.1007/11555827_26
Mendeley helps you to discover research relevant for your work.