{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:02:21Z","timestamp":1743073341170,"version":"3.40.3"},"publisher-location":"Heidelberg","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319009445"},{"type":"electronic","value":"9783319009452"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-00945-2_21","type":"book-chapter","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T09:29:17Z","timestamp":1369906157000},"page":"237-244","source":"Crossref","is-referenced-by-count":1,"title":["Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools"],"prefix":"10.1007","author":[{"given":"Ireneusz","family":"J\u00f3\u017awiak","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"K\u0119dziora","sequence":"additional","affiliation":[]},{"given":"Aleksandra","family":"Meli\u0144ska","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3-4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.diin.2009.01.001","volume":"5","author":"J.D. Kornblum","year":"2009","unstructured":"Kornblum, J.D.: Implementing BitLocker Drive Encryption for forensic analysis. Digital Investigation\u00a05(3-4), 75\u201384 (2009) ISSN 1742-2876","journal-title":"Digital Investigation"},{"unstructured":"Casey, E.: Practical Approaches to Recovering Encrypted Digital Evidence. International Journal of Digital Evidence\u00a01(3) (Fall 2002)","key":"21_CR2"},{"doi-asserted-by":"crossref","unstructured":"Altheide, C., Merloni, C., Zanero, S.: A methodology for the repeatable forensic analysis of encrypted drives. In: Proceedings of the 1st European Workshop on System Security, EUROSEC 2008 (2008)","key":"21_CR3","DOI":"10.1145\/1355284.1355289"},{"doi-asserted-by":"crossref","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys (February 2008) (submitted for publication)","key":"21_CR4","DOI":"10.1145\/1506409.1506429"},{"doi-asserted-by":"crossref","unstructured":"Liskov, M., Rivest, R., Wagner, D.: Tweakable Block Ciphers. MIT and UC Berkeley (2002)","key":"21_CR5","DOI":"10.1007\/3-540-45708-9_3"},{"unstructured":"Security in Storage Working Group of the IEEE Computer Society Committee. IEEE P1619, Standard for Cryptographic Protection of Data on Block-Oriented Storage Devices (2007)","key":"21_CR6"},{"unstructured":"National Institute of Standards and Technology (NIST). NIST Special Publication 800-38E, Recommendation for Block Cipher Modes of Operation: The XTS-AES Mode for Confidentiality on Storage Devices (January 2010)","key":"21_CR7"},{"unstructured":"Information Technology Laboratory, NIST. FIPS Pub 140-2: Security Requirements For Cryptographic Modules","key":"21_CR8"},{"unstructured":"Kleidermacher, D.: Enhance system security with better data-at-rest encryption. Embeded (March 2012)","key":"21_CR9"},{"unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1996) ISBN 0-8493-8523-7","key":"21_CR10"},{"unstructured":"Czeskis, A., St. Hilaire, D.J., Koscher, K., Gribble, S.D., Kohno, T., Schneier, B.: Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications. In: 3rd Workshop on Hot Topics in Security (2008)","key":"21_CR11"},{"doi-asserted-by":"crossref","unstructured":"Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption, Cryptology ePrint Archive, Report 1996\/002","key":"21_CR12","DOI":"10.1007\/BFb0052229"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/3-540-49380-8_6","volume-title":"Information Hiding","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Needham, R., Shamir, A.: The steganographic file system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 73\u201382. Springer, Heidelberg (1998)"},{"key":"21_CR14","series-title":"AISC","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-21393-9_6","volume-title":"Dependable Computer Systems","author":"I. Jozwiak","year":"2011","unstructured":"Jozwiak, I., Kedziora, M., Melinska, A.: Theoretical and practical aspects of encrypted containers detection - digital forensics approach. In: Zamojski, W., Kacprzyk, J., Mazurkiewicz, J., Sugier, J., Walkowiak, T. (eds.) Dependable Computer Systems. AISC, vol.\u00a097, pp. 75\u201385. Springer, Heidelberg (2011)"},{"unstructured":"Walker, J.: Introduction to Probability and Statistics, A Pseudorandom Number Sequence Test Program. Fourmilab (January 28, 2008)","key":"21_CR15"},{"doi-asserted-by":"crossref","unstructured":"Fragkos, G., Tryfonas, T.: A cognitive Model for the Forensic Recovery of End User Passwords. Digital Forensics and Incident Analysis, 48\u201354 (2007)","key":"21_CR16","DOI":"10.1109\/WDFIA.2007.4299372"}],"container-title":["Advances in Intelligent Systems and Computing","New Results in Dependability and Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-00945-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:30:32Z","timestamp":1675956632000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-00945-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319009445","9783319009452"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-00945-2_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2013]]}}}