Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices
Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financi...
Main Authors: | Bahman A. Sassani (Sarrafpour), Mohammed Alkorbi, Noreen Jamil, M. Asif Naeem, Farhaan Mirza |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2020-01-01
|
Series: | Scientific Programming |
Online Access: | http://dx.doi.org/10.1155/2020/6132312 |
Similar Items
-
Data Analytics in Mental Healthcare
by: Ayesha Kamran Ul haq, et al.
Published: (2020-01-01) -
Performance differences in encryption software versus storage devices
by: Olsson, Robin
Published: (2012) -
Big Data Velocity Management–From Stream to Warehouse via High Performance Memory Optimized Index Join
by: M. Asif Naeem, et al.
Published: (2020-01-01) -
Deniable Storage Encryption for Mobile Devices
by: Skillen, Adam
Published: (2013) -
KiwiVault: Encryption Software for Portable Storage Devices
by: Florence, Trevor Bradshaw
Published: (2009)