Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation.
Vrizlynn L. L. ThingZheng Leong ChuaPublished in: SEC (2013)
Keyphrases
- security analysis
- digital forensics
- security requirements
- high security
- smart card
- public key
- encryption scheme
- authentication protocol
- security model
- security properties
- image encryption
- user authentication
- authentication scheme
- encryption algorithm
- mutual authentication
- private key
- mobile devices
- resource constrained
- access control
- image compression
- similarity measure