메뉴 건너뛰기




Volumn 7, Issue 2, 2009, Pages 18-25

Forensics is so "yesterday"

Author keywords

Chain of custody; Data; Digital forensics; Law; Legal; Security

Indexed keywords

CHAIN OF CUSTODY; DATA; DIGITAL FORENSICS; LAW; LEGAL; SECURITY;

EID: 65249178821     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2009.37     Document Type: Article
Times cited : (14)

References (5)
  • 1
    • 84859015303 scopus 로고    scopus 로고
    • Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations
    • Information Hiding 1998, Springer
    • R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations," Information Hiding 1998, LNCS 1525, Springer, 1998, pp. 124-142; www.cl.cam.ac.uk/-mgk25/ih98-temnpest.pdf.
    • (1998) LNCS , vol.1525 , pp. 124-142
    • Anderson, R.1    Kuhn, M.2
  • 3
    • 85077701725 scopus 로고    scopus 로고
    • Lest We Remember: Cold Boot Attacks on Encryption Keys
    • Usenix Assoc
    • J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys." Proc. Usenix Security Symp., Usenix Assoc, 2008; http://citp.princeton. edu/memory/.
    • (2008) Proc. Usenix Security Symp
    • Alex Halderman, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.