{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:57:44Z","timestamp":1725843464968},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811002809"},{"type":"electronic","value":"9789811002816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-981-10-0281-6_80","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T23:57:57Z","timestamp":1450310277000},"page":"559-566","source":"Crossref","is-referenced-by-count":0,"title":["Secure Deletion for Flash-Based Self-Encrypting Drives"],"prefix":"10.1007","author":[{"given":"Hanwook","family":"Lee","sequence":"first","affiliation":[]},{"given":"Jongho","family":"Mun","sequence":"additional","affiliation":[]},{"given":"Jiye","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Youngsook","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,18]]},"reference":[{"key":"80_CR1","unstructured":"M\u00fcller, T., Latzo, T., Freiling, F.C.: Self-encrypting disks pose self-decrypting risks. In: Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, USA (2011)"},{"key":"80_CR2","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TCE.2008.4711235","volume":"54","author":"K Sun","year":"2008","unstructured":"Sun, K., Choi, J., Lee, D., Noh, S.H.: Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics. IEEE Trans. Consumer Electronics 54, 100\u2013104 (2008)","journal-title":"IEEE Trans. Consumer Electronics"},{"key":"80_CR3","doi-asserted-by":"crossref","unstructured":"Lee, J., Heo, J., Cho, Y., Hong, J., Shin, S.: Secure deletion for NAND flash file system. In: Proc. ACM SAC, pp. 1710\u20131714 (2008)","DOI":"10.1145\/1363686.1364093"},{"issue":"3","key":"80_CR4","first-page":"933","volume":"27","author":"B Lee","year":"2011","unstructured":"Lee, B., Son, K., Won, D., Kim, S.: Secure data deletion for USB flash memory. J. Inf. Sci. Eng. 27(3), 933\u2013952 (2011)","journal-title":"J. Inf. Sci. Eng."},{"key":"80_CR5","unstructured":"Reardon, J., Capkun, S., Basin, D.: Data node encrypted file system: efficient secure deletion for flash memory. In: 21st USENIX Conference on Security Symposium (2012)"},{"key":"80_CR6","doi-asserted-by":"crossref","unstructured":"Choi, Y., Lee, D., Jeon, W., Won, D.: Password-based single-file encryption and secure data deletion for solid-state drive. In: 8th International Conference on Ubiquitous Information Management and Communication, pp. 1\u20137 (2014)","DOI":"10.1145\/2557977.2558072"},{"key":"80_CR7","unstructured":"Willett, M.: Self-encrypting drives (2009). \n                  http:\/\/www.snia.org\/sites\/default\/education\/tutorials\/2009\/spring\/security\/MichaelWillett_Self_Encrypting_Drives.pdf"},{"issue":"3","key":"80_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1555815.1555758","volume":"37","author":"BC Lee","year":"2009","unstructured":"Lee, B.C., Ipek, E., Mutlu, O., Burger, D.: Architecting phase change memory as a scalable DRAM alternative. ACM SIGARCH Computer Architecture News 37(3), 2\u201313 (2009)","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"80_CR9","doi-asserted-by":"crossref","unstructured":"Eilert, S., Leinwander, M., Crisenza, G.: Phase change memory (PCM): a new memory technology to enable new memory usage models. In: IMW 2009, pp. 1\u20132 (2009)","DOI":"10.1109\/IMW.2009.5090604"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Computer Science and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-0281-6_80","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T20:30:29Z","timestamp":1559334629000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-0281-6_80"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9789811002809","9789811002816"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-0281-6_80","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2015]]}}}