Study of file encryption and decryption system using security key

G Hu - 2010 2nd International Conference on Computer …, 2010 - ieeexplore.ieee.org
The paper tries to have made a study of the security keys of USB, which can achieve these
functions such as data encryption, digital signature, and identity authentication. Based on …

Design and implementation of encrypted and decrypted file system based on USBKey and hardware code

K Wu, Y Zhang, W Cui, T Jiang - AIP Conference Proceedings, 2017 - pubs.aip.org
To protect the privacy of sensitive data, an encrypted and decrypted file system based on
USBKey and hardware code is designed and implemented in this paper. This system uses …

Research on a normal file encryption and decryption

GA Yandji, LL Hao, AE Youssouf… - … on Computer and …, 2011 - ieeexplore.ieee.org
The advent of information technology (internet) some decades ago has brought about many
changes in the way information is being disseminated and exchanged between people …

File encryption and decryption system based on RSA algorithm

S Wang, G Liu - 2011 International Conference on …, 2011 - ieeexplore.ieee.org
This paper describes a complete set of practical solution to file encryption based on RSA
algorithm. With analysis of the present situation of the application of RSA algorithm, we find …

A new hierarchical file encryption system based on smartphone

J Bian, B Lu, J Kuang - … of 2012 2nd International Conference on …, 2012 - ieeexplore.ieee.org
With the development of Mobile Internet, the smart phones become more and more popular.
So a lot of people choose to store personal information directly on the Smartphone. It usually …

A novel secure virtual storage device scheme

J Ma, Z Li, J Li - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
Confidential data in our computer is always threatened by the risk of internal staff and
external hacker. Secure document system may be a best solution to settle this problem and it …

Research and application of transparent encrypting file system based on windows kernel

S Li, X Jia - 2010 International Conference on Computational …, 2010 - ieeexplore.ieee.org
By analyzing the basic principles of file encrypting system, the essay mainly research and
implement the transparent encrypting file system which is based on the filter driver in the …

Design and implementation of dual-factor authentication file encryption system based on smart-phone

Z Zhang - 2012 IEEE Symposium on Electrical & Electronics …, 2012 - ieeexplore.ieee.org
Designed and implemented a dual-factor authentication file encryption system based on
smart-phone, analyzed the security of file encryption system and combined dual-factor …

Enhancing file data security in linux operating system by integrating secure file system

RK Pal, I Sengupta - 2009 IEEE Symposium on Computational …, 2009 - ieeexplore.ieee.org
In today's world securing file data is very important. The proposed Secure File System (SFS),
we have designed, provides file data security using cryptographic techniques in a …

Research and implementation of file encryption and decryption

L Chang, X GuangMing - Advances in Computer Science and Engineering, 2012 - Springer
AISC 141 - Research and Implementation of File Encryption and Decryption Page 1 D. Zeng (Ed.):
Advances in Computer Science and Engineering, AISC 141, pp. 165–170. springer link.com © …