Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory
暂无分享,去创建一个
[1] David Woodhouse,et al. JFFS : The Journalling Flash File System , 2001 .
[2] Radia Perlman,et al. The ephemerizer: making data disappear , 2005 .
[3] Paul H. Siegel,et al. Characterizing flash memory: Anomalies, observations, and applications , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).
[4] Srdjan Capkun,et al. Keeping data secret under full compromise using porter devices , 2010, ACSAC '10.
[5] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[6] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[7] Sang-Won Lee,et al. A survey of Flash Translation Layer , 2009, J. Syst. Archit..
[8] Richard J. Lipton,et al. A Revocable Backup System , 1996, USENIX Security Symposium.
[9] Randal C. Burns,et al. Secure deletion for a versioning file system , 2005, FAST'05.
[10] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[11] Nikolai Joukov,et al. Secure deletion myths, issues, and solutions , 2006, StorageSS '06.
[12] Steven Swanson,et al. Reliably Erasing Data from Flash-Based Solid State Drives , 2011, FAST.
[13] Srdjan Capkun,et al. Secure Deletion on Log-structured File Systems , 2011, ArXiv.
[14] Nitesh Saxena,et al. Accelerometers and randomness: perfect together , 2011, WiSec '11.
[15] Mendel Rosenblum,et al. The design and implementation of a log-structured file system , 1991, SOSP '91.
[16] Niels Provos,et al. Encrypting Virtual Memory , 2000, USENIX Security Symposium.
[17] 阿米尔·班. Flash File System , 1994 .
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Jongmoo Choi,et al. Models and Design of an Adaptive Hybrid Scheme for Secure Deletion of Data in Consumer Electronics , 2008, IEEE Transactions on Consumer Electronics.
[20] Tal Garfinkel,et al. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation , 2005, USENIX Security Symposium.
[21] Steven Bauer,et al. Secure Data Deletion for Linux File Systems , 2001, USENIX Security Symposium.
[22] J. Frields,et al. National Industrial Security Program. Operating Manual Supplement , 1995 .
[23] Sivan Toledo,et al. Algorithms and data structures for flash memories , 2005, CSUR.
[24] Yookun Cho,et al. An Efficient Secure Deletion Scheme for Flash File Systems , 2010, J. Inf. Sci. Eng..
[25] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .
[26] Srdjan Capkun,et al. User-level secure deletion on log-structured file systems , 2012, ASIACCS '12.
[27] Dongho Won,et al. Secure Data Deletion for USB Flash Memory , 2011, J. Inf. Sci. Eng..
[28] Steven Swanson,et al. SAFE : Fast , Verifiable Sanitization for SSDs Or : Why encryption alone is not a solution for sanitizing SSDs , 2010 .
[29] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.