1. The risks of key recovery, key escrow, and trusted third-party encryption;Abelson;World Wide Web J.,1997
2. Keys under doormats;Abelson;Commun. ACM,2015
3. A forensic analysis framework for recovering encryption keys and BB10 backup decryption;Al Shehhi,2014
4. A post-mortem forensic approach for the kik messenger on Android;Al-Rawashdeh,2020
5. Modg, got HW crypto? On the (in)security of a self-encrypting drive series;Alendal,2015