Transactions on Dependable and Secure Computing Mobiflage: Deniable Storage Encryption for Mobile Devices
暂无分享,去创建一个
[1] Mohammad Mannan,et al. On Implementing Deniable Storage Encryption for Mobile Devices , 2013, NDSS.
[2] Bruce Schneier,et al. Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications , 2008, HotSec.
[3] Xavier Boyen,et al. Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys , 2007, USENIX Security Symposium.
[4] Srdjan Capkun,et al. Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory , 2012, USENIX Security Symposium.
[5] Adi Shamir,et al. The Steganographic File System , 1998, Information Hiding.
[6] Bruce Schneier,et al. Cryptography Engineering - Design Principles and Practical Applications , 2010 .
[7] Ralf-Philipp Weinmann,et al. Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks , 2012, WOOT.
[8] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[9] Morris J. Dworkin. SP 800-38E. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices , 2010 .
[10] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[11] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[12] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[13] iOS Security , 2013 .
[14] Clemens Fruhwirth,et al. New Methods in Hard Disk Encryption , 2005 .
[15] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[16] Andrew Hoog. Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor. , 2011 .
[17] Steven Swanson,et al. Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.