Practical Approaches to Recovering Encrypted Digital Evidence, International Journal for Digital Evidence, vol.1, 2002. ,
Encountering Encrypted Evidence (Potential), Proceedings of the 4th Conference on Information Technology Curriculum, 2002. ,
Encountering encryption, Computers & Security, vol.22, issue.5, pp.388-391, 2003. ,
DOI : 10.1016/S0167-4048(03)00504-2
Penetrating encrypted evidence, Digital Investigation, vol.1, issue.2, pp.102-105, 2004. ,
DOI : 10.1016/j.diin.2004.04.002
Defeating encrypted and deniable file systems: TrueCrypt v5, 2008. ,
Law Enforcement and Digital EvidenceMicrosoft: Learn about the features: Shadow Copy, 2005. ,
Microsoft Windows Vista Registry, MSc. Cranfield University, 2009. ,
File System Forensic Analysis, 2005. ,
Forensic Computing: A Practitioners GuideMicrosoft: Default cluster size for NTFS, FAT, and exFAT http, p.140365, 2007. ,
Recovery of Encryption Keys from Memory Using a Linear Scan. The International Workshop on Digital Forensics, 2008. ,