1. Defeating encrypted and deniable file systems: Truecrypt v5.1a and the case of the tattling os and applications;Czeskis,2008
2. Automatic bitcoin address clustering;Ermilov,2017
3. A new model for forensic data extraction from encrypted mobile devices;Fukami;Forensic Sci. Int.: Digit. Invest.,2021
4. Digital media triage with bulk data analysis and bulk_extractor;Garfinkel;Comput. Secur.,2013
5. Lest we remember: cold-boot attacks on encryption keys;Halderman;Commun. ACM,2009