Timed data deletion on mobile communication devices

作者: Claudio Marforio

DOI: 10.3929/ETHZ-A-006154349

关键词:

摘要:

参考文章(11)
Timothy Grance, Marissa Myers, Marc Stevens, SP 800-36. Guide to Selecting Information Technology Security Products National Institute of Standards & Technology. ,(2003)
Radia Perlman, The ephemerizer: making data disappear Journal of Information System Security. ,vol. 1, pp. 51- 68 ,(2005)
Henry M. Levy, Tadayoshi Kohno, Amit A. Levy, Roxana Geambasu, Vanish: increasing data privacy with self-destructing data usenix security symposium. pp. 299- 316 ,(2009)
Whitfield Diffie, Paul C. Van Oorschot, Michael J. Wiener, Authentication and authenticated key exchanges Designs, Codes and Cryptography. ,vol. 2, pp. 107- 125 ,(1992) , 10.1007/BF00124891
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y Shin, None, Secure deletion for NAND flash file system Proceedings of the 2008 ACM symposium on Applied computing - SAC '08. pp. 1710- 1714 ,(2008) , 10.1145/1363686.1364093
D. Dolev, A. C. Yao, On the security of public key protocols 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981). pp. 350- 357 ,(1981) , 10.1109/SFCS.1981.32
N. Joukov, E. Zadok, Adding secure deletion to your favorite file system Third IEEE International Security in Storage Workshop (SISW'05). pp. 63- 70 ,(2005) , 10.1109/SISW.2005.1
Peter Gutmann, Secure deletion of data from magnetic and solid-state memory usenix security symposium. pp. 8- 8 ,(1996)
Nikolai Joukov, Harry Papaxenopoulos, Erez Zadok, Secure deletion myths, issues, and solutions Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06. pp. 61- 66 ,(2006) , 10.1145/1179559.1179571
Edward W. Felten, J. Alex Halderman, Nadia Heninger, Brent Waters, Emmett Witchel, Owen S. Hofmanny, Scott Wolchoky, Christopher J. Rossbach, Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs network and distributed system security symposium. ,(2010)