Software-Based Memory Erasure with relaxed isolation requirements: Extended Version
This article presents a new approach to software-based Proof of Secure Erasure (PoSE) protocols. These protocols are designed to verify that a device has erased its memory within the protocol…
Continue reading