Difference between revisions of "Bibliography"

From ForensicsWiki
Jump to: navigation, search
Line 1: Line 1:
===== Important Forensics Papers: =====
+
Important Forensics Papers:
  
 
[[Recovering Overwritten Data#The Gutmann Paper| Secure Deletion of Data from Magnetic and Solid-State Memory]], Peter Gutmann, Proceedings of the Sixth Usenix Security Symposium, 1996.
 
[[Recovering Overwritten Data#The Gutmann Paper| Secure Deletion of Data from Magnetic and Solid-State Memory]], Peter Gutmann, Proceedings of the Sixth Usenix Security Symposium, 1996.
  
 
[http://http://www.actionfront.com/ts_whitepaper.asp|Drive-Independent Data Recovery: The Current State-of-the-Art], ActionFront Data Recovery Labs, August 2005.
 
[http://http://www.actionfront.com/ts_whitepaper.asp|Drive-Independent Data Recovery: The Current State-of-the-Art], ActionFront Data Recovery Labs, August 2005.
 
 
===== Cryptographical File System Papers: =====
 
 
[http://http://www.crypto.com/papers/cfskey.pdf|Key Management in an Encrypting File System], Matt Blaze, USENIX Summer 1994 Technical Conference, Boston, MA, June 1994.
 
 
[http://http://www.crypto.com/papers/cfs.pdf|A Cryptographic File System for Unix], Matt Blaze, Proceedings of the First ACM Conference on Computer and Communications Security, Fairfax, VA, November 1993.
 

Revision as of 23:39, 8 November 2005

Important Forensics Papers:

Secure Deletion of Data from Magnetic and Solid-State Memory, Peter Gutmann, Proceedings of the Sixth Usenix Security Symposium, 1996.

Data Recovery: The Current State-of-the-Art, ActionFront Data Recovery Labs, August 2005.