Back to Results
First PageMeta Content
System software / Computing / TrueCrypt / Deniable encryption / Comparison of disk encryption software / Software / Cryptographic software / Disk encryption


Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications Alexei Czeskis∗ David J. St. Hilaire∗
Add to Reading List

Document Date: 2008-07-16 12:26:51


Open Document

File Size: 265,95 KB

Share Result on Facebook

Company

Adobe / Deniable File Systems / Google / Computer Information Systems / Needham / Microsoft / The Guardian / /

Country

United States / /

IndustryTerm

sense that these applications / free data recovery tool / open-source disk-encryption software package / desktop search applications / disk-encryption software meets / disk encryption systems / open source systems / file systems / non-primary applications / nonprimary applications / mountable file systems / malicious applications / circulated applications / encrypted file systems / Less robust applications / desktop search application / decryption algorithms / media discussions / security protocols / difficultly following security protocols / /

Movie

Declaration of Independence / /

OperatingSystem

Windows Vista / UNIX / Mac OS X / Linux / Windows Vista Business / Microsoft Windows / Microsoft Vista / /

Organization

Univ. of Washington / U.S. Securities and Exchange Commission / Electronic Frontier Foundation / /

Person

Karl Koscher∗ Tadayoshi Kohno / David J. St. Hilaire / Tadayoshi Kohno∗ Abstract Bruce / /

Position

human-rights worker / federal law enforcement officer / customs officer / /

PublishedMedium

The Guardian / /

Technology

Linux / UNIX / disk encryption / cloning / security protocols / operating system / decryption algorithms / operating systems / anti-virus software / encryption / TrueCrypt encryption / http / caching / /

URL

http /

SocialTag