메뉴 건너뛰기




Volumn , Issue , 2011, Pages 537-550

Televisions, video privacy, and powerline electromagnetic interference

Author keywords

Electromagnetic interference; Information leakage; Powerline security

Indexed keywords

ELECTRONIC DEVICE; INFORMATION LEAKAGE; MULTIPLE INSTANCES; POWER LINES; POWER SUPPLY; TV MODELS; VIDEO CONTENTS;

EID: 80755169467     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046770     Document Type: Conference Paper
Times cited : (57)

References (29)
  • 3
    • 80755172952 scopus 로고    scopus 로고
    • Sniffing keystrokes with lasers/voltmeters: Side channel attacks using optical sampling of mechanical energy and power line leakage
    • Andrea Barisani and Daniele Bianco. Sniffing keystrokes with lasers/voltmeters: Side channel attacks using optical sampling of mechanical energy and power line leakage. In Black Hat Technical Security Conference: USA, 2009.
    • (2009) Black Hat Technical Security Conference: Usa
    • Barisani, A.1    Bianco, D.2
  • 7
    • 80755173870 scopus 로고    scopus 로고
    • Analog.com
    • Analog Devices. Analog devices power measure ic for smart meters. Analog.com, http://www.analog.com/en/analog-to-digital-converters/energy- measurement/products/index.html, 2010.
    • (2010) Analog Devices Power Measure Ic for Smart Meters
  • 8
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • V.W. Eck. Electromagnetic radiation from video display units: An eavesdropping risk? Computers and Security, 4:269-286, 1985.
    • (1985) Computers and Security , vol.4 , pp. 269-286
    • Eck, V.W.1
  • 10
    • 78650002846 scopus 로고    scopus 로고
    • ElectriSense: Single-point sensing using EMI for electrical event detection and classification in the home
    • S. Gupta, S.N. Patel, and M.S. Reynolds. ElectriSense: Single-point sensing using EMI for electrical event detection and classification in the home. In International Conference on Ubiquitous Computing, 2010.
    • (2010) International Conference on Ubiquitous Computing
    • Gupta, S.1    Patel, S.N.2    Reynolds, M.S.3
  • 12
    • 80755172951 scopus 로고    scopus 로고
    • History of Tempest. Cryptome, http://cryptome.org/tempest-old.htm, 2000.
    • (2000) History of Tempest
  • 13
    • 0001297528 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • P.C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology, 1996.
    • (1996) Advances in Cryptology
    • Kocher, P.C.1
  • 22
    • 70450194016 scopus 로고    scopus 로고
    • Detecting human movement by differential air pressure sensing in HVAC system ductwork: An exploration in infrastructure mediated sensing
    • S.N. Patel, M.S. Reynolds, and G.D. Abowd. Detecting human movement by differential air pressure sensing in HVAC system ductwork: An exploration in infrastructure mediated sensing. In International Conference on Pervasive Computing, 2008.
    • (2008) International Conference on Pervasive Computing
    • Patel, S.N.1    Reynolds, M.S.2    Abowd, G.D.3
  • 27
    • 80755172944 scopus 로고    scopus 로고
    • The benefits of smart meters. California Public Utilities Commision, http://www.cpuc.ca.gov/PUC/energy/Demand+Response/benefits.htm, 2010.
    • (2010) The Benefits of Smart Meters
  • 28
    • 84882198584 scopus 로고    scopus 로고
    • Compromising electromagnetic emanations of wired and wireless keyboards
    • M. Vuoagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium, 2009.
    • (2009) USENIX Security Symposium
    • Vuoagnoux, M.1    Pasini, S.2
  • 29
    • 50249161557 scopus 로고    scopus 로고
    • Language identification of encrypted VoIP traffic: Alejandra y roberto or alice and bob?
    • C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security Symposium, 2007.
    • (2007) USENIX Security Symposium
    • Wright, C.V.1    Ballard, L.2    Monrose, F.3    Masson, G.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.