In this paper we discuss memories with their basic protection mechanisms and the results of the evaluation of a modem high-density flash memory by an Information Technology Security Evaluation Facility (ITSEF). In a second part, we address the notion of Authenticated Flash and present some authentication methodologies used for existing Flash devices. © 2009 Vieweg+Teubner | GWV Fachverlage GmbH, Wiesbaden.
CITATION STYLE
Handschuh, H., & Trichina, E. (2009). Securing flash technology: How does it look from inside? In ISSE 2008 - Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2008 Conference (pp. 380–389). https://doi.org/10.1007/978-3-8348-9283-6_40
Mendeley helps you to discover research relevant for your work.