{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:29Z","timestamp":1750308089537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103780.1103798","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"115-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Security of erasable memories against adaptive adversaries"],"prefix":"10.1145","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[{"name":"Telcordia, Piscataway, NJ"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","volume-title":"Security amplification by composition: the case of doubly-iterated, ideal ciphers, in \"Advances in Cryptology - Proceedings of CRYPTO 98","author":"Aiello B.","unstructured":"B. Aiello , M. Bellare , G. Di Crescenzo , and R. Venkatesan , Security amplification by composition: the case of doubly-iterated, ideal ciphers, in \"Advances in Cryptology - Proceedings of CRYPTO 98 \", Lecture Notes in Computer Science , Springer Verlag . B. Aiello, M. Bellare, G. Di Crescenzo, and R. Venkatesan, Security amplification by composition: the case of doubly-iterated, ideal ciphers, in \"Advances in Cryptology - Proceedings of CRYPTO 98\", Lecture Notes in Computer Science, Springer Verlag."},{"volume-title":"Proc. of USENIX 97","author":"Boneh D.","key":"e_1_3_2_1_2_1","unstructured":"D. Boneh , and R. Lipton , A revocable backup system , Proc. of USENIX 97 . D. Boneh, and R. Lipton, A revocable backup system, Proc. of USENIX 97."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 17th Symposium on Theoretical Aspects of Computer Science (STACS","author":"Crescenzo G. Di","year":"2000","unstructured":"G. Di Crescenzo , N. Ferguson , R. Impagliazzo , and M. Jakobsson , How to forget a secret , in Proceedings of the 17th Symposium on Theoretical Aspects of Computer Science (STACS 2000 ), Lecture Notes in Computer Science, Springer Verlag. G. Di Crescenzo, N. Ferguson, R. Impagliazzo, and M. Jakobsson, How to forget a secret, in Proceedings of the 17th Symposium on Theoretical Aspects of Computer Science (STACS 2000), Lecture Notes in Computer Science, Springer Verlag."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of 6th USENIX Security Symposium","author":"Gutmann P.","year":"1996","unstructured":"P. Gutmann , Secure Deletion of Data from Magnetic and Solid-State Memory , in Proceedings of 6th USENIX Security Symposium , 1996 . P. Gutmann, Secure Deletion of Data from Magnetic and Solid-State Memory, in Proceedings of 6th USENIX Security Symposium, 1996."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of 10th USENIX Security Symposium","author":"Gutmann P.","year":"2001","unstructured":"P. Gutmann , Data Remanence in Semiconductor Devices , in Proceedings of 10th USENIX Security Symposium , 2001 . P. Gutmann, Data Remanence in Semiconductor Devices, in Proceedings of 10th USENIX Security Symposium, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539793244708"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217022"},{"volume-title":"Proceedings of USENIX 95","author":"Yee B.","key":"e_1_3_2_1_11_1","unstructured":"B. Yee and D. Tygar , Secure coprocessors in electronic commerce applications , in Proceedings of USENIX 95 . B. Yee and D. Tygar, Secure coprocessors in electronic commerce applications, in Proceedings of USENIX 95."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the IEEE Computer Society Conference on Security and Privacy","author":"Weingart S.","year":"1987","unstructured":"S. Weingart , Physical Security for the \u03bcABYSS System , Proceedings of the IEEE Computer Society Conference on Security and Privacy , 1987 . S. Weingart, Physical Security for the \u03bcABYSS System, Proceedings of the IEEE Computer Society Conference on Security and Privacy, 1987."},{"volume-title":"Version 1.3, Distributed security systems group","author":"White S.","key":"e_1_3_2_1_13_1","unstructured":"S. White , S. Weingart , W. Arnold , and E. Palmer , Introduction to the Citadel Architecture: Security in Physically Exposed Environments , Version 1.3, Distributed security systems group , IBM Thomas J. Watson Research Center . S. White, S. Weingart, W. Arnold, and E. Palmer, Introduction to the Citadel Architecture: Security in Physically Exposed Environments, Version 1.3, Distributed security systems group, IBM Thomas J. Watson Research Center."},{"key":"e_1_3_2_1_14_1","volume-title":"CMU Computer Science: 25th Anniversary Commemorative","author":"Tygar D.","year":"1991","unstructured":"D. Tygar and B. Yee , Strongbox: A System for Self Securing Programs , CMU Computer Science: 25th Anniversary Commemorative , Addison-Wesley , 1991 . D. Tygar and B. Yee, Strongbox: A System for Self Securing Programs, CMU Computer Science: 25th Anniversary Commemorative, Addison-Wesley, 1991."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 ACM workshop on Storage security and survivability"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103780.1103798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:07:52Z","timestamp":1750262872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103780.1103798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":14,"alternative-id":["10.1145\/1103780.1103798","10.1145\/1103780"],"URL":"https:\/\/doi.org\/10.1145\/1103780.1103798","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}