{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T05:45:16Z","timestamp":1751521516338,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558072","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Password-based single-file encryption and secure data deletion for solid-state drive"],"prefix":"10.1145","author":[{"given":"Younsung","family":"Choi","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Suwon, South Korea"}]},{"given":"Donghoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, South Korea"}]},{"given":"Woongryul","family":"Jeon","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, South Korea"}]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"volume-title":"Inside Solid State Drives (SSDs)","author":"Marelli Alessia","key":"e_1_3_2_1_1_1","unstructured":"Micheloni, Rino, Alessia Marelli , and Kam Eshghi . 2013. Inside Solid State Drives (SSDs) . Vol. 37 . Springer . Micheloni, Rino, Alessia Marelli, and Kam Eshghi. 2013. Inside Solid State Drives (SSDs). Vol. 37. Springer."},{"key":"e_1_3_2_1_2_1","volume-title":"Michael Yung Chung, et al","author":"Wei","year":"2011","unstructured":"Wei , Michael Yung Chung, et al . 2011 . Reliably Erasing Data from Flash-Based Solid State Drives. FAST. Wei, Michael Yung Chung, et al. 2011. Reliably Erasing Data from Flash-Based Solid State Drives. FAST."},{"key":"e_1_3_2_1_3_1","unstructured":"Vamsee Kasavajhala. 15 June 2012. SSD vs HDD Price and Performance Study. a Dell technical white paper. Dell PowerVault Technical Marketing.  Vamsee Kasavajhala. 15 June 2012. SSD vs HDD Price and Performance Study . a Dell technical white paper. Dell PowerVault Technical Marketing."},{"key":"e_1_3_2_1_4_1","unstructured":"Tal Arie. 31 July 2010. NAND vs. NOR flash technology: The designer should weigh the options when using flash memory.  Tal Arie. 31 July 2010. NAND vs. NOR flash technology: The designer should weigh the options when using flash memory ."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2002.1010143"},{"key":"e_1_3_2_1_6_1","unstructured":"STMicroelectronics. 2004. Bad Block Management in NAND Flash Memories. APPLICATION NOTE AN1819.  STMicroelectronics. 2004. Bad Block Management in NAND Flash Memories . APPLICATION NOTE AN1819."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676699"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244248"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.07.003"},{"key":"e_1_3_2_1_10_1","unstructured":"Intel Corporation. 2012. Intel\u00ae High Performance Solid State Drive - Advantages of TRIM. Intel.com.  Intel Corporation. 2012. Intel \u00ae High Performance Solid State Drive - Advantages of TRIM . Intel.com."},{"key":"e_1_3_2_1_11_1","unstructured":"Savill John. 2010-06-19. What is the TRIM function for solid-state disks (SSDs) and why is it important?. WindowsITPro.  Savill John. 2010-06-19. What is the TRIM function for solid-state disks (SSDs) and why is it important? . WindowsITPro."},{"key":"e_1_3_2_1_12_1","unstructured":"Intel Corporation. June 2012. Managing Intel Solid-State Drives Using Intel vPro Technology. IT Intel White Paper.  Intel Corporation. June 2012. Managing Intel Solid-State Drives Using Intel vPro Technology . IT Intel White Paper."},{"key":"e_1_3_2_1_13_1","unstructured":"Kommentar hinzuf\u00fcgen. Jan 2010. SSDs and TrueCrypt: durability and performance issues. Mediaaddicted.  Kommentar hinzuf\u00fcgen. Jan 2010. SSDs and TrueCrypt: durability and performance issues . Mediaaddicted."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2008.4470030"},{"key":"e_1_3_2_1_15_1","unstructured":"Meltem S\u00f6nmez Turan Elaine Barker. Dec. 2010. Recommendation for Password-Based Key Derivation Part 1: Storage Applications. NIST Special Publication 800--132.  Meltem S\u00f6nmez Turan Elaine Barker. Dec. 2010. Recommendation for Password-Based Key Derivation Part 1: Storage Applications . NIST Special Publication 800--132."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Josefsson Simon. 2011. PKCS# 5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors.  Josefsson Simon. 2011. PKCS# 5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors .","DOI":"10.17487\/rfc6070"},{"key":"e_1_3_2_1_17_1","unstructured":"USB Implementers Forum. September 2008. Universal Serial Bus Mass Storage Class Specification Overview.  USB Implementers Forum. September 2008. Universal Serial Bus Mass Storage Class Specification Overview ."},{"key":"e_1_3_2_1_18_1","volume-title":"Safe: Fast, verifiable sanitization for ssds.","author":"Wei Michael","year":"2010","unstructured":"Swanson, Steven, and Michael Wei . 2010 . Safe: Fast, verifiable sanitization for ssds. Swanson, Steven, and Michael Wei. 2010. Safe: Fast, verifiable sanitization for ssds."},{"key":"e_1_3_2_1_20_1","unstructured":"Shawn Knight. 12 June 2012. SandForce SF-2000 series controller limited to 128-bit AES encryption. TECHSPOT  Shawn Knight. 12 June 2012. SandForce SF-2000 series controller limited to 128-bit AES encryption . TECHSPOT"},{"volume-title":"Proceedings of the 17th USENIX Security Symposium.","author":"Halderman J. A.","key":"e_1_3_2_1_21_1","unstructured":"J. A. Halderman , S. D. Schoen , N. Heninger , W. Clarkson , W. Paul , J. A. Calandrino , A. J. Feldman , J. Appelbaum , and E. W. Felten . Aug . 2008. Lest We Remember: Cold Boot Attacks on Encryptions Keys . In Proceedings of the 17th USENIX Security Symposium. J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Aug. 2008. Lest We Remember: Cold Boot Attacks on Encryptions Keys. In Proceedings of the 17th USENIX Security Symposium."},{"key":"e_1_3_2_1_22_1","unstructured":"M\u00fcller Tilo Tobias Latzo and Felix C. Freiling. Self-Encrypting Disks pose Self-Decrypting Risks.  M\u00fcller Tilo Tobias Latzo and Felix C. Freiling. Self-Encrypting Disks pose Self-Decrypting Risks ."},{"key":"e_1_3_2_1_23_1","unstructured":"Richard Russon and Yuval Fledel. 2011-06-26. NTFS Documentation.  Richard Russon and Yuval Fledel. 2011-06-26. NTFS Documentation ."},{"key":"e_1_3_2_1_24_1","unstructured":"YAFFS\n  : Yet Another Flash File System http:\/\/www.yaffs.net. YAFFS: Yet Another Flash File System http:\/\/www.yaffs.net."},{"issue":"3","key":"e_1_3_2_1_25_1","first-page":"933","article-title":"Secure Data Deletion for USB Flash Memory","volume":"27","year":"2011","unstructured":"Lee, Byunghee, 2011 . Secure Data Deletion for USB Flash Memory . J. Inf. Sci. Eng. 27 . 3 : 933 -- 952 . Lee, Byunghee, et al. 2011. Secure Data Deletion for USB Flash Memory. J. Inf. Sci. Eng. 27.3: 933--952.","journal-title":"J. Inf. Sci. Eng."}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558072","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":24,"alternative-id":["10.1145\/2557977.2558072","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558072","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}