The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /

Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012

Bibliographic Details
Main Authors: Nordiana Rahim, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat
Format:
Language:eng
Published: 2012
Subjects:
_version_ 1826449459891929088
author Nordiana Rahim, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
author_facet Nordiana Rahim, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
author_sort Nordiana Rahim, 1987-
collection OCEAN
description Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012
first_indexed 2024-03-05T11:40:47Z
format
id KOHA-OAI-TEST:463641
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T11:40:47Z
publishDate 2012
record_format dspace
spelling KOHA-OAI-TEST:4636412020-12-19T17:17:00ZThe analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory / Nordiana Rahim, 1987- Norafida Ithnin Fakulti Sains Komputer dan Sistem Maklumat 2012engThesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012Includes bibliographical referencesPRZSLCryptographyData encryption (Computer science)
spellingShingle Cryptography
Data encryption (Computer science)
Nordiana Rahim, 1987-
Norafida Ithnin
Fakulti Sains Komputer dan Sistem Maklumat
The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title_full The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title_fullStr The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title_full_unstemmed The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title_short The analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory /
title_sort analysis of extraction and memory analysis forensic tool for searching cryptographic key in volatile memory
topic Cryptography
Data encryption (Computer science)
work_keys_str_mv AT nordianarahim1987 theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory
AT norafidaithnin theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory
AT fakultisainskomputerdansistemmaklumat theanalysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory
AT nordianarahim1987 analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory
AT norafidaithnin analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory
AT fakultisainskomputerdansistemmaklumat analysisofextractionandmemoryanalysisforensictoolforsearchingcryptographickeyinvolatilememory