The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
2012
|
Subjects: |
_version_ | 1826449459891929088 |
---|---|
author | Nordiana Rahim, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat |
author_facet | Nordiana Rahim, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat |
author_sort | Nordiana Rahim, 1987- |
collection | OCEAN |
description | Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012 |
first_indexed | 2024-03-05T11:40:47Z |
format | |
id | KOHA-OAI-TEST:463641 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T11:40:47Z |
publishDate | 2012 |
record_format | dspace |
spelling | KOHA-OAI-TEST:4636412020-12-19T17:17:00ZThe analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / Nordiana Rahim, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat 2012engThesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012Includes bibliographical referencesPRZSLCryptographyData encryption (Computer science) |
spellingShingle | Cryptography Data encryption (Computer science) Nordiana Rahim, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title | The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title_full | The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title_fullStr | The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title_full_unstemmed | The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title_short | The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / |
title_sort | analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory |
topic | Cryptography Data encryption (Computer science) |
work_keys_str_mv | AT nordianarahim1987 theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory AT norafidaithnin theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory AT fakultisainskomputerdansistemmaklumat theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory AT nordianarahim1987 analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory AT norafidaithnin analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory AT fakultisainskomputerdansistemmaklumat analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory |