The Effectiveness of Internet Activity Erasure Tools to Protect Privacy
暂无分享,去创建一个
[1] Craig Valli. Throwing out the Enterprise with the Hard Disk , 2004, Australian Computer, Network & Information Forensics Conference.
[2] Andrew Woodward,et al. An Investigation into the Efficacy of Three Erasure Tools under Windows 7 , 2010 .
[3] Sangjin Lee,et al. Advanced evidence collection and analysis of web browser activity , 2011, Digit. Investig..
[4] Wenjie Wang,et al. A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.
[5] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[6] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[7] D. Wall. Policing identity crimes , 2013 .
[8] Joseph A. Cazier,et al. A Study of Hard Drive Forensics on Consumers' PCs: Data Recovery and Exploitation , 2010 .
[9] 翟起滨. {0,1,3}精确群结构 , 1987 .
[10] Krishnun Sansurooah,et al. A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011 , 2012 .
[11] Craig Valli,et al. Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks , 2007 .
[12] Quan-xing Miao,et al. Research and analysis on Encryption Principle of TrueCrypt software system , 2010, The 2nd International Conference on Information Science and Engineering.