Trigger of TEMPEST testing standard update
暂无分享,去创建一个
[1] Y. Yamanaka,et al. Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer , 2006, 2006 17th International Zurich Symposium on Electromagnetic Compatibility.
[2] Christof Paar,et al. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment , 2009, WISA.
[3] Markus G. Kuhn,et al. Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.
[4] Bin Yu,et al. Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer Keyboards , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[5] Martin Vuagnoux,et al. An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[6] Hidema Tanaka,et al. Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures , 2007, ICISS.
[7] Arie Yeredor,et al. Dictionary attacks using keyboard acoustic emanations , 2006, CCS '06.
[8] Hidema Tanaka,et al. A Trial of the Interception of Display Image Using Emanation of Electromagnetic Wave , 2005 .
[9] Takeshi Sugawara,et al. Information leakage from cryptographic hardware via common-mode current , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.
[10] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[11] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[12] Kaori Fukunaga,et al. Reconstruction of Printed Image Using Electromagnetic Disturbance from Laser Printer , 2007, IEICE Trans. Commun..
[13] Li Yongmei,et al. The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system , 2013, 2013 8th International Conference on Computer Science & Education.
[14] Li Yongmei,et al. The Designing of TEMPEST Security Testing Model , 2014 .
[15] H. Tanaka. Information Leakage via Electromagnetic Emanation and Effectiveness of Averaging Technique , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[16] W. V. Eck. Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .
[17] Rakesh Agrawal,et al. Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[18] Li Yongmei,et al. Designing eraser of secret information in EEPROM , 2010, 2010 5th International Conference on Computer Science & Education.
[19] Peter Smulders,et al. The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..
[20] Feng Zhou,et al. Keyboard acoustic emanations revisited , 2005, CCS '05.
[21] Yu-ichi Hayashi,et al. Information leakage from the unintentional emissions of an integrated RC oscillator , 2011, 2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits.