{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:25:32Z","timestamp":1730294732417,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911545","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:39:23Z","timestamp":1412095163000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Seizure of digital data and \u201cselective suppression\u201d of digital evidence"],"prefix":"10.1109","author":[{"given":"Nicolai","family":"Kuntze","sequence":"first","affiliation":[{"name":"Fraunhofer SIT (Germany)"}]},{"given":"Carsten","family":"Rudolph","sequence":"additional","affiliation":[{"name":"Fraunhofer SIT (Germany)"}]},{"given":"Hellen","family":"Schilling","sequence":"additional","affiliation":[{"name":"Kempf & Dannenfeldt, Frankfurt, Germany"}]},{"given":"Aaron","family":"Alva","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Brooke","family":"Brisbois","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Barbara","family":"Endicott-Popovsky","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]}],"member":"263","reference":[{"journal-title":"Bundesamt f\ufffdr Sicherheit in der Informationstechnik","year":"0","key":"3"},{"journal-title":"National Institute of Standards and Technology Guide to Integrating Forensic Techniques into Incident Response Nist Sp 800-86","year":"2006","author":"kent","key":"2"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdcf.2009010101","article-title":"Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools","volume":"1","author":"garfinkel","year":"2008","journal-title":"International Journal of Digital Crime and Forensics"},{"journal-title":"Forensic toolkit","year":"2005","author":"data","key":"1"},{"journal-title":"BSI TR-03138 \"ersetzendes Scannen (RESISCAN)\" Bundesamt f\ufffdr Sicherheit in der Informationstechnik","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_40"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56625-7_16"},{"journal-title":"Einf\ufffdhrung in Die Kryptologie","year":"2004","author":"buchmann","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_21"},{"key":"8","article-title":"Technische richtlinie zur vertrauens-w\ufffdrdigen langzeitarchivierung","author":"reh\ufffduer","year":"2009","journal-title":"Tagungsband D-A-CH Security IT-Verlag"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, China","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911545.pdf?arnumber=6911545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T20:10:21Z","timestamp":1623183021000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6911545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911545","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}