-
5
-
-
34047215259
-
-
CMU-ISRI-05-119, Institute of Software Research, International, Carnegie Mellon University, June
-
M.Geiger and L.Cranor. Counter-Forensic Privacy Tools - A Forensic evaluation. CMU-ISRI-05-119, Institute of Software Research, International, Carnegie Mellon University, June 2005.
-
(2005)
Counter-Forensic Privacy Tools - A Forensic Evaluation
-
-
Geiger, M.1
Cranor, L.2
-
8
-
-
30644459230
-
Searches and Seizures in a Digital World
-
GWU Law School Public Law Research Paper No. 135
-
Orin S. Kerr, Searches and Seizures in a Digital World. Harvard Law Review, Vol. 119, 2006; GWU Law School Public Law Research Paper No. 135.
-
(2006)
Harvard Law Review
, vol.119
-
-
Kerr, O.S.1
-
11
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
Jan/Feb
-
S.L.Garfinkel and A.Shelat. Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy, Jan/Feb 2003.
-
(2003)
IEEE Security and Privacy
-
-
Garfinkel, S.L.1
Shelat, A.2
-
12
-
-
84858725225
-
-
Department of Defense Manual, DoD 5200.28-M, June
-
Automated Data Processing Security Manual, Department of Defense Manual, DoD 5200.28-M, June 1979.
-
(1979)
Automated Data Processing Security Manual
-
-
-
13
-
-
0012040642
-
-
Department of Commerce, National Bureau of Standards Special Publication 500 101, June
-
Care and Handling of Computer Magnetic Storage Media, Department of Commerce, National Bureau of Standards Special Publication 500 101, June 1983.
-
(1983)
Care and Handling of Computer Magnetic Storage Media
-
-
-
14
-
-
84858734960
-
-
Department of the Navy Automated Data Processing Security Program, Chief of Naval Operations Instruction, OPNAVlNST 5239.1A, 1982
-
Department of the Navy Automated Data Processing Security Program, Chief of Naval Operations Instruction, OPNAVlNST 5239.1A, 1982.
-
-
-
-
15
-
-
84858717880
-
-
Remanence Security, Air Force Systems Security Instruction, AFSSI 5020, April 1991
-
Remanence Security, Air Force Systems Security Instruction, AFSSI 5020, April 1991.
-
-
-
-
16
-
-
84858711695
-
-
National Industrial Security Manual for Safeguarding Classified Information, Department of Defense Manual, DoD 5220.22-M, June 1987
-
National Industrial Security Manual for Safeguarding Classified Information, Department of Defense Manual, DoD 5220.22-M, June 1987.
-
-
-
-
21
-
-
35248899192
-
Deriving case-specific Live Forensics Investigation procedures from FORZA
-
R.Ieong, and H. C. Leung, "Deriving case-specific Live Forensics Investigation procedures from FORZA", Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea, March 2007.
-
Proceedings of the 2007 ACM Symposium on Applied Computing, Seoul, Korea, March 2007
-
-
Ieong, R.1
Leung, H.C.2
-
22
-
-
85008016160
-
Scrubbing stubborn data: An evaluation of computer forensic privacy tools
-
M.Geiger and L. Cranor, "Scrubbing stubborn data: An evaluation of computer forensic privacy tools", IEEE Security and Privacy Magazine, 4(5):16-25, 2006
-
(2006)
IEEE Security and Privacy Magazine
, vol.4
, Issue.5
, pp. 16-25
-
-
Geiger, M.1
Cranor, L.2
-
23
-
-
84858722475
-
Tax website shut down as memory stick with secret personal data of 12million is found in a pub car park
-
Tax website shut down as memory stick with secret personal data of 12million is found in a pub car park, Mail Online, http://www.dailymail.co.uk/ news/article-1082402/Tax-website-shut-memory-stick-secret-personal-data- 12million-pub-car-park.html
-
Mail Online
-
-
-
26
-
-
33745120364
-
Secure Conjunctive keyword search over encrypted data
-
ACNS 2004, Springer-Verlag
-
P. Golle, J. Staddon and B. Waters, "Secure Conjunctive keyword search over encrypted data," ACNS 2004, LNCS 3089, pp. 31-45, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
28
-
-
33244488406
-
-
Cryptology ePrint Archive, Report 2003/216
-
Eu-Jin Goh, "Secure Indexes", Cryptology ePrint Archive, Report 2003/216, 2003 (http://eprint.iacr.org/2003/216/).
-
(2003)
Secure Indexes
-
-
Goh, E.-J.1
|