With the importance of data security, organizations are paying more attention on the confidentiality of their data. Data can be carried around portably by the means of a portable storage device such as thumb drive. Given the small physical size of the storage devices, it could be a common problem where people will misplace or lost these devices. If the device contains any confidential data and these data falls into the hands of some unintended people, there could be serious implications. Be it intended or unintended, breach of data can be a serious issue. In the market, there are available products such as Drivecrypt, Folder Lock and etc. that provide the features of protecting the data stored in these portable storage devices. Howev...
Abstract — The worst news for information technology people are computer has been stolen or lost. Th...
In many multimedia applications, such as pay-TV, there are often conflicts between high security and...
For business users, securing data isn’t really an option – it’s mandatory. That’s never truer than f...
When having sensitive information on portable computers it’s important to make sure that the data is...
The protection of data is key issue in todays world. The wide of availability and use of portable te...
Sensitive information leakage in files is one of the biggest concerns in people's life. Conside...
Since the development of telecommunication systems the secure transmission of sensible information h...
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwo...
Encryption is the art of preserving confidentiality of digital information. It is considered to be o...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
The importance of securing data and information is a critical issue in todays world. These are no lo...
Confidentiality protection is a request not only for companies but also for private users. Neverthel...
Information stored on unprotected computers that gets lost or stolen, and falls intothe wrong hands,...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Modern authentication practices are susceptible to exploitation due to password weakness. These vuln...
Abstract — The worst news for information technology people are computer has been stolen or lost. Th...
In many multimedia applications, such as pay-TV, there are often conflicts between high security and...
For business users, securing data isn’t really an option – it’s mandatory. That’s never truer than f...
When having sensitive information on portable computers it’s important to make sure that the data is...
The protection of data is key issue in todays world. The wide of availability and use of portable te...
Sensitive information leakage in files is one of the biggest concerns in people's life. Conside...
Since the development of telecommunication systems the secure transmission of sensible information h...
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwo...
Encryption is the art of preserving confidentiality of digital information. It is considered to be o...
Cybercrime is a serious social problem. Data security threats affect not only large financial organi...
The importance of securing data and information is a critical issue in todays world. These are no lo...
Confidentiality protection is a request not only for companies but also for private users. Neverthel...
Information stored on unprotected computers that gets lost or stolen, and falls intothe wrong hands,...
This paper focuses on security of information saved on hard disk drives using encryption. The posibi...
Modern authentication practices are susceptible to exploitation due to password weakness. These vuln...
Abstract — The worst news for information technology people are computer has been stolen or lost. Th...
In many multimedia applications, such as pay-TV, there are often conflicts between high security and...
For business users, securing data isn’t really an option – it’s mandatory. That’s never truer than f...