Trusted Computing for Disk Drives and Other Peripherals
暂无分享,去创建一个
[1] Jim Hughes,et al. Security in Storage , 2003, Computer.
[2] Gregory R. Ganger,et al. Better security via smarter devices , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[3] S. B. Guthery. Java card: Internet computing on a smart card , 1997 .
[4] Iván Arce,et al. Bad Peripherals , 2005, IEEE Secur. Priv..
[5] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[6] G. F. Hughes. Secure Erase of Disk Drive Data , 2002 .
[7] Yi-Min Wang,et al. How to “Root” a Rootkit That Supports Root Processes Using Strider GhostBuster Enterprise Scanner , 2005 .
[8] Mark A. Franklin,et al. The Mercury System: Embedding Computation into Disk Drives , 2004 .
[9] D. Touretzky. Gallery of CSS Descramblers , 2002 .