References
- Apple Inc. (n.d.). NSMutableString. Retrieved November 15, 2016, from https://developer.apple.com/reference/foundation/nsmutablestring
- Birnbaum, M. H. (2004). Human research and data collection via the internet. Annual Review of Psychology, 55, 803–832. doi:10.1146/annurev.psych.55.090902.141601
- Biryukov, A., & Khovratovich, D. (2009). Related-key cryptanalysis of the full AES-192 and AES-256. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics) (vol. 5912 LNCS, pp. 1–18). doi:10.1007/978-3-642-10366-7_1
- Candes, E. J., & Tao, T. (2005). Decoding by linear programming. IEEE Transactions on Information Theory, 51, 4203–4215. doi:10.1109/TIT.2005.858979
- Cornell University, Best Practices for Media Destruction. (2014, September 12). Retrieved September, 2015, from http://www.it.cornell.edu/security/how.cfm?cat=6&tip=57
- Garfinkel, S. L., & Shelat, A. (2003). Remembrance of data passed: A study of disk sanitization practices. IEEE Security and Privacy, 1, 17–27. doi:10.1109/MSECP.2003.1176992
- Gutmann, P. (1996). Secure deletion of data from magnetic and solid-state memory. In Sixth USENIX security symposium proceedings (pp. 77–90). Retrieved from https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html\nhttp://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
- Hamburg, M. (2014, April 7). Cryptography: What is the difference between AES, blowfish, and DES? Retrieved February 3, 2017, from Quora, https://www.quora.com/Cryptography-What-is-the-difference-between-AES-Blowfish-and-DES
- Hughes, G. (2006, October). Security for disk drive data at rest ... disk drive opportunities? Retrieved October, 2015, from http://www.media-tech.net/fileadmin/templates/resources/sc06/mtc06_keynote_day1_hughes.pdf
- Hughes, G. F., Coughlin, T., & Commins, D. M. (2009). Disposal of disk and tape data by secure sanitization. IEEE Security and Privacy, 7, 29–34. doi:10.1109/MSP.2009.89
- Jedrzejczyk, L., Price, B. A., Bandara, A. K., Nuseibeh, B., Hall, W., & Keynes, M. (2009). I know what you did last summer: Risks of location data leakage in mobile and social computing. Retrieved from http://computing-reports.open.ac.uk/2009/TR2009-11.pdf
- Melvin, S. (2010, September). The forgetful disk drive—Zytek communications corporation. Retrieved October, 2015, from http://www.zytek.com/ForgetfulDiskDrive.pdf
- Reardon, J., Basin, D., & Capkun, S. (2013). SoK: Secure data deletion. In Proceedings - IEEE Symposium on Security and Privacy (pp. 301–315). doi:10.1109/SP.2013.28
- Rothke, B. (2009). Why information must be destroyed. Retrieved November 14, 2016, from http://www.csoonline.com/article/2123705/privacy/why-information-must-be-destroyed.html
- Seagate Technology LLC., Seagate Technology Announces Preliminary Financial Information For Fiscal Fourth Quarter And Year-End 2016. (n.d.). Retrieved November 15, 2016, from http://www.seagate.com/em/en/about-seagate/news/seagate-technology-announces-preliminary-financial-information-for-fiscal-fourth-quarter-and-year-end-2016-pr/
- Srinivasan, A. (2012). ERASE—Entropy-based robust sanitization of sensitive data. In The 7th international conference for internet technology and secured transactions (vol. 1998, pp. 427–432).
- Stack Overflow, Random Uppercase - Lowercase. (n.d.). Retrieved November 15, 2016, from http://stackoverflow.com/questions/7060154/random-uppercase-lowercase
- Takeuchi, K. (2010, April). Github: AES-256 basic crypt test algorithm for Xcode. Retrieved December, 2014, from https://github.com/ulhas/crypt/find/master
- Teltzrow, M., & Kobsa, A. (2004). Impacts of user privacy preferences on personalized systems. Designing Personalized User Experiences in ECommerce Human-Computer Interaction Series, 315–332. doi:10.1007/1-4020-2148-8_17