-
2
-
-
10444267476
-
-
Bishop, M., Bhumiratana, B., Crawford, R., Levitt, K., June 2004. How to sanitize data. In: Proceedings of 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'04). pp. 217-222.
-
-
-
-
3
-
-
33847668690
-
-
Bourne, V., January 2005. The risk of sharing. Available from: .
-
-
-
-
4
-
-
10644245884
-
On the role of file system metadata in digital forensics
-
Buchholz F., and Spafford E. On the role of file system metadata in digital forensics. J. Digital Invest. 1 December (2004) 298-309
-
(2004)
J. Digital Invest.
, vol.1
, Issue.December
, pp. 298-309
-
-
Buchholz, F.1
Spafford, E.2
-
5
-
-
2342477114
-
Information leakage caused by hidden data in published documents
-
Byers S. Information leakage caused by hidden data in published documents. IEEE Security Privacy 2 2 (2004) 23-27
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.2
, pp. 23-27
-
-
Byers, S.1
-
6
-
-
33847644408
-
-
Cachin, C., 2005. Digital steganography. In: Encyclopedia of Cryptography and Security. pp. 129-168.
-
-
-
-
7
-
-
33847672127
-
-
Calipari Incident at Wikipedia Online Encyclopedia, May 2005. The Calipari Incident. Available from: .
-
-
-
-
10
-
-
33847683243
-
-
Cypherpunks mailing list, October 2000. The Mike Ciresi Incident. Available from: .
-
-
-
-
11
-
-
33847663213
-
-
DataTek Engineering, 2004. The Forensic ToolKit. Available from: .
-
-
-
-
12
-
-
33847649161
-
-
Davis Wright Tremaine LLP, October 2005. Privacy and Security Law Blog: The New Dictionary is Here ... Available from: .
-
-
-
-
13
-
-
33847666720
-
-
Dornseif, M., December 2004. Far more than you ever wanted to tell - hidden data in document formats. Available from: .
-
-
-
-
14
-
-
33847648720
-
-
Farmer, D., Venema, W., 2004. The Coroner's Toolkit. Available from: .
-
-
-
-
15
-
-
33847647445
-
-
Free Software Foundation, June 2005. GNU binutils. Available from: .
-
-
-
-
16
-
-
3042825662
-
Remembrance of Data Passed: A Study of Disk Sanitization Practices
-
January/February
-
Garfinkel S., and Shelat A. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security and Privacy 1 1 (2003) 17-27 January/February
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
17
-
-
33847635938
-
-
Guidance Software, 2005. Encase forensic software. Available from: .
-
-
-
-
18
-
-
33847621055
-
-
Gutmann, P., July 1996. Secure Deletion of Data from Magnetic and Solid-State Memory. In: Proceedings of the Sixth Usenix Security Symposium. pp. 77-90.
-
-
-
-
19
-
-
33847675252
-
An overview of steganography for the computer forensics examiner
-
Available from:
-
Kessler G.C. An overview of steganography for the computer forensics examiner. J. Forensic Sci. Commun. - Federal Bureau Invest. 6 3 (2004). http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004_03_research01.htm Available from:
-
(2004)
J. Forensic Sci. Commun. - Federal Bureau Invest.
, vol.6
, Issue.3
-
-
Kessler, G.C.1
-
20
-
-
33847656480
-
-
Kraft, M.S., Kennedy, P.D., Lesser, P.E., 2004. Ezclean. Available from: .
-
-
-
-
21
-
-
33847633320
-
-
McCarthy, K., May 2005. The Calipari/Sgrena Incident. Available from: .
-
-
-
-
22
-
-
33847654113
-
-
Microsoft Corporation, 1999. OLE Concepts and Requirements Overview. Available from: .
-
-
-
-
23
-
-
33847662304
-
-
Microsoft Corporation, 2004a. Remove hidden data tool. Available from: .
-
-
-
-
24
-
-
33847665004
-
-
Microsoft Corporation, 2004b. Remove personal or hidden information. Available from: .
-
-
-
-
25
-
-
33847687079
-
-
National Institute of Standards and Technology (NIST), November 2001. Advanced Encryption Standard (AES) (FIPS PUB 197). Available from: .
-
-
-
-
26
-
-
33847665893
-
-
National Institute of Standards and Technology (NIST), March 2002a. The Keyed-Hash Message Authentication Code (HMAC) (FIPS PUB 198). Available from: .
-
-
-
-
27
-
-
33847682126
-
-
National Institute of Standards and Technology (NIST), August 2002b. The Secure Hash Signature Standard (SHS) (FIPS PUB 180-2). Available from: .
-
-
-
-
28
-
-
33847641992
-
-
OpenDocument Format, January 2006. The OpenDocument format. Available from: .
-
-
-
-
29
-
-
1242310066
-
-
Pang, R., Paxson, V., August 2003. A high-level programming environment for packet trace anonymization and transformation. In: Proceedings of the ACM SIGCOMM 2003. pp. 339-351.
-
-
-
-
30
-
-
33847673892
-
-
Payne Group, 2005. Metadata Assistant. Available from: .
-
-
-
-
31
-
-
1242263141
-
-
Peuhkuri, M., November 2001. A method to compress and anonymize packet traces. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop '01. pp. 257-261.
-
-
-
-
32
-
-
3042742327
-
Hide and seek: an introduction to steganography
-
Provos N., and Honeyman P. Hide and seek: an introduction to steganography. IEEE Security and Privacy 1 3 (2003) 32-44
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 32-44
-
-
Provos, N.1
Honeyman, P.2
-
33
-
-
33847673469
-
-
Rentz, D., September 2004. Microsoft Compound Document File Format. Available from: .
-
-
-
-
34
-
-
33847615512
-
-
Roelofs, G., Gailly, J.L., 2004. Compression library. Available from: .
-
-
-
-
35
-
-
1242286401
-
The future of computer forensics: a needs analysis survey
-
Rogers M., and Seigfried K. The future of computer forensics: a needs analysis survey. Computers and Security 23 1 (2004) 12-16
-
(2004)
Computers and Security
, vol.23
, Issue.1
, pp. 12-16
-
-
Rogers, M.1
Seigfried, K.2
-
36
-
-
33847665894
-
-
RSA Lab., March 1999. PKCS #5 v2.0: Password-Based Cryptography Standard.
-
-
-
-
37
-
-
35048881059
-
-
Sadeghi, A.R., Stuble, C., April 2004. Taming Trusted Platforms by Operating System Design. Lecture Notes in Computer Science, 2908, pp. 286-302.
-
-
-
-
38
-
-
33847671679
-
-
Schwartz, M., 2004. LAOLA. Available from: .
-
-
-
-
39
-
-
33847624442
-
-
Sinofsky, S., June 2005. Microsoft Makes XML the File Format for the Next Version of Microsoft Office. Available from: .
-
-
-
-
40
-
-
33847670475
-
-
Smith, R.M., June 2003. Blair's Iraq Dossier. Available from: .
-
-
-
-
41
-
-
33847643546
-
-
Smith, R., 2004. Word Dumper. Available from: .
-
-
-
-
42
-
-
33847682552
-
-
Soft Experience, 2005. Catalogue. Available from: .
-
-
-
-
43
-
-
33847638346
-
-
StegoArchive, January 2006. Available from: .
-
-
-
-
44
-
-
33847649436
-
-
Telematics between Administrations Committee (TAC) of the European Community, June 2004. European public sector advised to use open document formats. Available from: .
-
-
-
-
45
-
-
33847646154
-
-
US Department of Defense, 1995. Cleaning and Sanitization Matrix. DOD 5220.22-M.
-
-
-
-
46
-
-
33847637911
-
-
US National Security Agency, December 2005. Redacting with Confidence: How to Safely Publish Sanitized Reports Converted From Word to PDF. Available from: .
-
-
-
-
47
-
-
33847632380
-
-
Workshare, 2005. Trace. Available from: .
-
-
-
-
48
-
-
1242308060
-
-
Xu, J., Fan, J., Ammar, M., Moon, S.B., November 2001. On the design and performance of prefix preserving IP traffic trace anonymization. In: Proceedings of the ACM SIGCOMM Internet Measurement Workshop '01. pp. 263-266.
-
-
-
|