-
3
-
-
85077028300
-
-
American National Standard of Accredited Standards Committee X3T13. January
-
American National Standard of Accredited Standards Committee X3T13. Information Technology - AT Attachment-3 Interface, January 1997.
-
(1997)
Information Technology - At Attachment-3 Interface
-
-
-
4
-
-
85077092213
-
-
American National Standard of Accredited Standards INCITS T13. June
-
American National Standard of Accredited Standards INCITS T13. Information Technology - ATA/ATAPI Command Set - 2, June 2010.
-
(2010)
Information Technology - ATA/ATAPI Command Set - 2
-
-
-
5
-
-
85026992376
-
-
Apple Inc. 6
-
Apple Inc. Mac OS X 10.6, 2009.
-
(2009)
Mac OS X
-
-
-
7
-
-
67650088596
-
A design for high-performance flash disks
-
Microsoft Research, December
-
A. Birrell, M. Isard, C. Thacker, and T. Wobber. A design for high-performance flash disks. Technical Report MSR-TR-2005-176, Microsoft Research, December 2005.
-
(2005)
Technical Report MSR-TR-2005-176
-
-
Birrell, A.1
Isard, M.2
Thacker, C.3
Wobber, T.4
-
11
-
-
51849106814
-
-
U. S. Defense Security Services. June
-
U. S. Defense Security Services. Clearing and Sanitization Matrix, June 2007.
-
(2007)
Clearing and Sanitization Matrix
-
-
-
14
-
-
85077030658
-
-
Eraser. http://eraser.heidi.ie/.
-
-
-
-
15
-
-
27344441029
-
Algorithms and data structures for flash memories
-
E. Gal and S. Toledo. Algorithms and data structures for flash memories. ACM Comput. Surv., 37(2):138-163, 2005.
-
(2005)
ACM Comput. Surv.
, vol.37
, Issue.2
, pp. 138-163
-
-
Gal, E.1
Toledo, S.2
-
17
-
-
85077064352
-
-
N. Z. Government Communications Security Bureau. Feburary
-
N. Z. Government Communications Security Bureau. Security of Information NZSIT 402, Feburary 2008.
-
(2008)
Security of Information NZSIT 402
-
-
-
18
-
-
76749111585
-
Characterizing flash memory: Anomalies, observations and applications
-
New York, NY, USA, ACM, IEEE
-
L. M. Grupp, A. M. Caulfield, J. Coburn, S. Swanson, E. Yaakobi, P. H. Siegel, and J. K. Wolf. Characterizing flash memory: Anomalies, observations and applications. In MICRO'09: Proceedings of ..., New York, NY, USA, 2009. ACM, IEEE.
-
(2009)
MICRO'09: Proceedings of .
-
-
Grupp, L.M.1
Caulfield, A.M.2
Coburn, J.3
Swanson, S.4
Yaakobi, E.5
Siegel, P.H.6
Wolf, J.K.7
-
19
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
Berkeley, CA, USA, USENIX Association
-
P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In SSYM'96: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, pages 8-8, Berkeley, CA, USA, 1996. USENIX Association.
-
(1996)
SSYM'96: Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography
, pp. 8
-
-
Gutmann, P.1
-
20
-
-
85084163443
-
Data remanence in semiconductor devices
-
Berkeley, CA, USA, USENIX Association
-
P. Gutmann. Data remanence in semiconductor devices. In SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, pages 4-4, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
SSYM'01: Proceedings of the 10th Conference on USENIX Security Symposium
, pp. 4
-
-
Gutmann, P.1
-
21
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: cold-boot attacks on encryption keys. Commun. ACM, 52(5):91-98, 2009.
-
(2009)
Commun. ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
22
-
-
56749184065
-
Secure deletion for NAND flash file system
-
New York, NY, USA, ACM
-
J. Lee, J. Heo, Y. Cho, J. Hong, and S. Y. Shin. Secure deletion for nand flash file system. In SAC '08: Proceedings of the 2008 ACM symposium on Applied computing, pages 1710-1714, New York, NY, USA, 2008. ACM.
-
(2008)
SAC '08: Proceedings of the 2008 ACM Symposium on Applied Computing
, pp. 1710-1714
-
-
Lee, J.1
Heo, J.2
Cho, Y.3
Hong, J.4
Shin, S.Y.5
-
23
-
-
84888677700
-
-
LSoft Technologies Inc. Active@ KillDisk. http://www.killdisk.com/.
-
Active@ KillDisk
-
-
-
24
-
-
0003508558
-
-
U. S. National Institute of Standards and Technology. November
-
U. S. National Institute of Standards and Technology. Advanced Encryption Standard (AES) (FIPS PUB 197), November 2001.
-
(2001)
Advanced Encryption Standard (AES) (FIPS PUB 197)
-
-
-
27
-
-
0003855464
-
-
C. John Wiley & Sons, Inc., New York, NY, USA
-
B. Schneier. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C. John Wiley & Sons, Inc., New York, NY, USA, 1995.
-
(1995)
Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in
-
-
Schneier, B.1
-
28
-
-
85077050912
-
-
secure rm. http://srm.sourceforge.net/.
-
-
-
|