暂无分享,去创建一个
[1] Craig Valli,et al. Oops they did it again: The 2007 Australian study of remnant data contained on 2nd hand hard disks , 2007 .
[2] Craig Valli,et al. The 2009 analysis of information remaining on USB storage devices offered for sale on the second hand market , 2009 .
[3] Sarah M. Diesburg,et al. A survey of confidential data storage and deletion methods , 2010, CSUR.
[4] Erez Zadok,et al. Type-safe disks , 2006, OSDI '06.
[5] Hubert Ritzdorf,et al. Secure data deletion from persistent media , 2013, CCS.
[6] Emmanuel Aroms. NIST Special Publication 800-88 Guidelines for Media Sanitization , 2012 .
[7] Lawrence E. Bassham,et al. Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .
[8] Mark Roeloffs,et al. Forensic Data Recovery from Flash Memory , 2007 .
[9] Steven Swanson,et al. Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.
[10] Srdjan Capkun,et al. SoK: Secure Data Deletion , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Timothy Vidas,et al. Empirical analysis of solid state disk data retention when used with contemporary operating systems , 2011, Digit. Investig..
[12] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .
[13] Srdjan Capkun,et al. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory , 2012, USENIX Security Symposium.
[14] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[15] Peter Gutmann,et al. Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.
[16] Paul Goldstein,et al. International Copyright: Principles, Law, and Practice , 2001 .
[17] Robert G. Picard,et al. The Internet and the Mass Media , 2008 .
[18] Andrea C. Arpaci-Dusseau,et al. Semantically-Smart Disk Systems , 2003, FAST.
[19] Craig Valli,et al. The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , 2010, J. Digit. Forensics Secur. Law.
[20] A. Meyer. The Health Insurance Portability and Accountability Act. , 1997, Tennessee medicine : journal of the Tennessee Medical Association.
[21] Justin Marshall,et al. TrueErase: per-file secure deletion for the storage data path , 2012, ACSAC '12.
[22] Krishnun Sansurooah,et al. A study of remnant data found on USB storage devices offered for sale on the Australian second hand market in 2011 , 2012 .
[23] Braden J. Phillips,et al. Recovering data from USB flash memory sticks that have been damaged or electronically erased , 2008, e-Forensics '08.