-
3
-
-
85084162908
-
A revocable backup system
-
Berkeley, CA, USA, USENIX Association
-
Boneh, D., and Lipton, R. J. A revocable backup system. In Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6 (Berkeley, CA, USA, 1996), USENIX Association, pp. 91–96.
-
(1996)
Proceedings of the 6th Conference on USENIX Security Symposium, Focusing on Applications of Cryptography
, vol.6
, pp. 91-96
-
-
Boneh, D.1
Lipton, R.J.2
-
5
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
Berkeley, CA, USA, SSYM’05, USENIX Association
-
Chow, J., Pfaff, B., Garfinkel, T., and Rosenblum, M. Shredding Your Garbage: Reducing Data Lifetime through Secure Deallocation. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14 (Berkeley, CA, USA, 2005), SSYM’05, USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, vol.14
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
6
-
-
65849353697
-
A survey of Flash Translation Layer
-
Chung, T.-S., Park, D.-J., Park, S., Lee, D.-H., Lee, S.-W., and Song, H.-J. A survey of Flash Translation Layer. Journal of Systems Architecture 55, 5-6 (2009), 332–343.
-
(2009)
Journal of Systems Architecture
, vol.55
, Issue.5-6
, pp. 332-343
-
-
Chung, T.-S.1
Park, D.-J.2
Park, S.3
Lee, D.-H.4
Lee, S.-W.5
Song, H.-J.6
-
8
-
-
27344441029
-
Algorithms and data structures for flash memories
-
Gal, E., and Toledo, S. Algorithms and Data Structures for Flash Memories. ACM Computing Surveys 37 (2005), 138–163.
-
(2005)
ACM Computing Surveys
, vol.37
, pp. 138-163
-
-
Gal, E.1
Toledo, S.2
-
9
-
-
3042825662
-
Remembrance of data passed: A study of disk sanitization practices
-
January
-
Garfinkel, S., and Shelat, A. Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Security & Privacy (January 2003), 17–27.
-
(2003)
IEEE Security & Privacy
, pp. 17-27
-
-
Garfinkel, S.1
Shelat, A.2
-
12
-
-
76749111585
-
Characterizing flash memory: Anomalies, observations, and applications
-
New York, NY, USA, MICRO 42, ACM
-
Grupp, L. M., Caulfield, A. M., Coburn, J., Swanson, S., Yaakobi, E., Siegel, P. H., and Wolf, J. K. Characterizing flash memory: anomalies, observations, and applications. In Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture (New York, NY, USA, 2009), MICRO 42, ACM, pp. 24–33.
-
(2009)
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 24-33
-
-
Grupp, L.M.1
Caulfield, A.M.2
Coburn, J.3
Swanson, S.4
Yaakobi, E.5
Siegel, P.H.6
Wolf, J.K.7
-
13
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
May
-
Halderman, J. A., Schoen, S. D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J. A., Feldman, A. J., Appelbaum, J., and Felten, E. W. Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM 52 (May 2009), 91–98.
-
(2009)
Communications of the ACM
, vol.52
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
17
-
-
34547403849
-
Secure deletion myths, issues, and solutions
-
Joukov, N., Papaxenopoulos, H., and Zadok, E. Secure Deletion Myths, Issues, and Solutions. ACM Workshop on Storage Security and Survivability (2006), 61–66.
-
(2006)
ACM Workshop on Storage Security and Survivability
, pp. 61-66
-
-
Joukov, N.1
Papaxenopoulos, H.2
Zadok, E.3
-
18
-
-
79958121705
-
Secure data deletion for USB flash memory
-
Lee, B., Son, K., Won, D., and Kim, S. Secure Data Deletion for USB Flash Memory. Journal of Information Science and Engineering 27 (2011), 933–952.
-
(2011)
Journal of Information Science and Engineering
, vol.27
, pp. 933-952
-
-
Lee, B.1
Son, K.2
Won, D.3
Kim, S.4
-
19
-
-
77249114232
-
An efficient secure deletion scheme for flash file systems
-
Lee, J., Yi, S., Heo, J., and Park, H. An Efficient Secure Deletion Scheme for Flash File Systems. Journal of Information Science and Engineering (2010), 27–38.
-
(2010)
Journal of Information Science and Engineering
, pp. 27-38
-
-
Lee, J.1
Yi, S.2
Heo, J.3
Park, H.4
-
29
-
-
85076225227
-
-
Linux man
-
Plumb, C. shred(1) - Linux man page.
-
Shred
, Issue.1
-
-
Plumb, C.1
-
30
-
-
78751506483
-
Keeping Data Secret under Full Compromise using Porter Devices
-
Pöpper, C., Basin, D., Capkun, S., and Cremers, C. Keeping Data Secret under Full Compromise using Porter Devices. In Computer Security Applications Conference (2010), pp. 241–250.
-
(2010)
Computer Security Applications Conference
, pp. 241-250
-
-
Pöpper, C.1
Basin, D.2
Capkun, S.3
Cremers, C.4
-
32
-
-
84871976328
-
Secure Deletion on Log-structured File Systems
-
Reardon, J., Marforio, C., Capkun, S., and Basin, D. Secure Deletion on Log-structured File Systems. 7th ACM Symposium on Information, Computer and Communications Security (2012).
-
(2012)
7th ACM Symposium on Information, Computer and Communications Security
-
-
Reardon, J.1
Marforio, C.2
Capkun, S.3
Basin, D.4
-
33
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Springer Lecture Notes in Computer Science
-
Rivest, R. L. All-Or-Nothing Encryption and The Package Transform. In Fast Software Encryption Conference (1997), Springer Lecture Notes in Computer Science, pp. 210–218.
-
(1997)
Fast Software Encryption Conference
, pp. 210-218
-
-
Rivest, R.L.1
-
35
-
-
41749084645
-
Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics
-
Sun, K., Choi, J., Lee, D., and Noh, S. Models and Design of an Adaptive Hybrid Scheme for Secure Deletion of Data in Consumer Electronics. IEEE Transactions on Consumer Electronics 54 (2008), 100–104.
-
(2008)
IEEE Transactions on Consumer Electronics
, vol.54
, pp. 100-104
-
-
Sun, K.1
Choi, J.2
Lee, D.3
Noh, S.4
-
38
-
-
80051914866
-
Accelerometers and randomness: Perfect together
-
New York, NY, USA, WiSec’11, ACM
-
Voris, J., Saxena, N., and Halevi, T. Accelerometers and randomness: perfect together. In Proceedings of the fourth ACM conference on Wireless network security (New York, NY, USA, 2011), WiSec’11, ACM, pp. 115–126.
-
(2011)
Proceedings of the Fourth ACM Conference on Wireless Network Security
, pp. 115-126
-
-
Voris, J.1
Saxena, N.2
Halevi, T.3
-
39
-
-
85021672500
-
Reliably erasing data from flash-based solid state drives
-
Berkeley, CA, USA
-
Wei, M., Grupp, L. M., Spada, F. M., and Swanson, S. Reliably Erasing Data from Flash-Based Solid State Drives. In Proceedings of the 9th USENIX conference on File and Storage Technologies (Berkeley, CA, USA, 2011), pp. 105–117.
-
(2011)
Proceedings of the 9th USENIX Conference on File and Storage Technologies
, pp. 105-117
-
-
Wei, M.1
Grupp, L.M.2
Spada, F.M.3
Swanson, S.4
-
40
-
-
16244412371
-
JFFS: The journalling flash file system
-
Woodhouse, D. JFFS: The Journalling Flash File System. In Ottawa Linux Symposium (2001).
-
(2001)
Ottawa Linux Symposium
-
-
Woodhouse, D.1
|