메뉴 건너뛰기




Volumn , Issue , 2010, Pages 307-322

Acoustic side-channel attacks on printers

Author keywords

[No Author keywords available]

Indexed keywords

HIDDEN MARKOV MODELS; MICROPHONES; PRINTING PRESSES; SPECTRUM ANALYSIS; SPEECH RECOGNITION;

EID: 84975609041     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (162)

References (42)
  • 1
    • 85056859322 scopus 로고
    • Available online at
    • National Security Agency. TEMPEST: A signal problem. Available online at http://www.nsa.gov/public/pdf/tempest.pdf, 1972.
    • (1972) TEMPEST: A Signal Problem
  • 5
    • 50249171782 scopus 로고    scopus 로고
    • Compromising reflections – Or – How to read LCD monitors around the corner
    • IEEE Computer Society
    • Michael Backes, Markus Dürmuth, and Dominique Unruh. Compromising reflections – or – how to read LCD monitors around the corner. In Proc. 2008 IEEE Symposium on Security and Privacy (Oakland 2008), pages 158–169. IEEE Computer Society, 2008.
    • (2008) Proc. 2008 IEEE Symposium on Security and Privacy (Oakland 2008) , pp. 158-169
    • Backes, M.1    Dürmuth, M.2    Unruh, D.3
  • 6
    • 84956995952 scopus 로고    scopus 로고
    • Some aspects of military line communications as deployed by the German armed forces prior to 1945
    • Centre for the History of Defence Electronics, Bournemouth University
    • Arthur O. Bauer. Some aspects of military line communications as deployed by the german armed forces prior to 1945. In The History of Military Communications, Proc. 5th Annual Colloquium. Centre for the History of Defence Electronics, Bournemouth University, 1999.
    • (1999) The History of Military Communications, Proc. 5th Annual Colloquium.
    • Bauer, A.O.1
  • 11
    • 0017542202 scopus 로고
    • The cepstrum: A guide to processing
    • Donald G. Childers, David P. Skinner, and Robert C. Kemerait. The cepstrum: A guide to processing. In Proc. of the IEEE, volume 65, pages 1428–1443, 1977.
    • (1977) Proc. Of the IEEE , vol.65 , pp. 1428-1443
    • Childers, D.G.1    Skinner, D.P.2    Kemerait, R.C.3
  • 12
    • 0002172868 scopus 로고
    • A stochastic parts program and noun phrase parser for unrestricted text
    • Kenneth W. Church. A stochastic parts program and noun phrase parser for unrestricted text. In Proc. of ANLP-2, pages 136–143, 1988.
    • (1988) Proc. Of ANLP-2 , pp. 136-143
    • Church, K.W.1
  • 14
    • 84936823652 scopus 로고
    • Grammatical category disambiguation by statistical optimization
    • Steven DeRose. Grammatical category disambiguation by statistical optimization. Computational Linguistics, 14(1):31–39, 1988.
    • (1988) Computational Linguistics , vol.14 , Issue.1 , pp. 31-39
    • DeRose, S.1
  • 15
    • 57649180845 scopus 로고    scopus 로고
    • Content-based retrieval of music and audio
    • Jonathan T. Foote. Content-based retrieval of music and audio. In Proc. of Multimedia Storage and Archiving, volume 3229, pages 138–147, 1997.
    • (1997) Proc. Of Multimedia Storage and Archiving , vol.3229 , pp. 138-147
    • Foote, J.T.1
  • 16
    • 24344497766 scopus 로고
    • Electromagnetic radiation revisited
    • Harold Joseph Highland. Electromagnetic radiation revisited. Comput. Secur., 5(2):85–93, 1986.
    • (1986) Comput. Secur. , vol.5 , Issue.2 , pp. 85-93
    • Highland, H.J.1
  • 18
    • 0026206264 scopus 로고
    • Hidden markov models for speech recognition
    • Biing-Hwang Juang and Lawrence R. Rabiner. Hidden markov models for speech recognition. Technometrics, 33(3):251–272, 1991.
    • (1991) Technometrics , vol.33 , Issue.3 , pp. 251-272
    • Juang, B.-H.1    Rabiner, L.R.2
  • 26
    • 85076277901 scopus 로고    scopus 로고
    • Isoplan:markforschung. Available Online at
    • Isoplan:markforschung. Study on the usage of dot-matrix printers. Available Online at http://dot-matrix-survey.webs.com/, 2009.
    • (2009) Study on the Usage of Dot-Matrix Printers
  • 31
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • Lawrence R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. Proc. of the IEEE, 77(2):257–286, 1989.
    • (1989) Proc. Of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 32
    • 0034313871 scopus 로고    scopus 로고
    • The earth mover’s distance as a metric for image retrieval
    • Yossi Rubner, Carlo Tomasi, and Leonidas J. Guibas. The earth mover’s distance as a metric for image retrieval. Int. Journal of Computer Vision, 40(2):99–121, 2000.
    • (2000) Int. Journal of Computer Vision , vol.40 , Issue.2 , pp. 99-121
    • Rubner, Y.1    Tomasi, C.2    Guibas, L.J.3
  • 35
    • 0025383421 scopus 로고
    • The threat of information theft by reception of electromagnetic radiation from RS-232 cables
    • Peter Smulders. The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Computers & Security, 9:53–58, 1990.
    • (1990) Computers & Security , vol.9 , pp. 53-58
    • Smulders, P.1
  • 36
    • 0022218742 scopus 로고
    • Electromagnetic radiation from video display units: An eavesdropping risk?
    • Wim van Eck. Electromagnetic radiation from video display units: An eavesdropping risk? Computers & Security, 4:269–286, 1985.
    • (1985) Computers & Security , vol.4 , pp. 269-286
    • Van Eck, W.1
  • 37
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • Andrew J. Viterbi. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory, 13(2):260–267, 1967.
    • (1967) IEEE Transactions on Information Theory , vol.13 , Issue.2 , pp. 260-267
    • Viterbi, A.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.