Content deleted Content added
m Task 18 (cosmetic): eval 25 templates: del empty params (27×); hyphenate params (5×); |
Citation bot (talk | contribs) Add: s2cid. | Use this bot. Report bugs. | Suggested by RoanokeVirginia | Category:CS1 errors: unsupported parameter | #UCB_Category 465/947 |
||
Line 200:
=== Acoustic ===
* {{cite book| last1 = Asonov | first1 =D. | title =IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004 | last2 = Agrawal | first2 = R. | periodical = Proceedings 2004 IEEE Symposium on Security and Privacy | pages = 3–11 | citeseerx = 10.1.1.89.8231 | year = 2004 | issn = 1081-6011 | doi = 10.1109/SECPRI.2004.1301311 | isbn = 978-0-7695-2136-7 | ref = Aso1 | chapter =Keyboard acoustic emanations | s2cid =216795 }}
* {{Citation| last1 = Zhuang | first1 = Li | last2 = Zhou | first2 = Feng | last3 = Tygar | first3 = J.D. | title = Keyboard acoustic emanations revisited | book-title = ACM Transactions on Information and System Security (TISSEC) | periodical = Proceedings of the 12th ACM Conference on Computer and Communications Security | place = Alexandria, Virginia, USA | volume = 13 | issue = 1 | pages = 373–382 | publisher = ACM New York, NY, USA | citeseerx = 10.1.1.117.5791 | year = 2005 | issn = 1094-9224 | doi = 10.1145/1609956.1609959 | isbn = 978-1-59593-226-6 | ref = Zhu1 }}
* {{cite book| last1 = Berger | first1 = Yigael | title = Proceedings of the 13th ACM conference on Computer and communications security – CCS '06 | last2 = Wool | first2 = Avishai | last3 = Yeredor | first3 = Arie | periodical = Proceedings of the 13th ACM Conference on Computer and Communications Security | pages = 245–254 | place = Alexandria, Virginia, USA | citeseerx = 10.1.1.99.8028 | publisher = ACM New York, NY, USA | year = 2006 | doi = 10.1145/1180405.1180436 | isbn = 978-1-59593-518-2 | ref = Ber1| chapter = Dictionary attacks using keyboard acoustic emanations | s2cid = 2596394 }}
* {{Citation| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Gerling | first3 = Sebastian | last4 = Pinkal | first4 = Manfred | last5 = Sporleder | first5 = Caroline | title = Acoustic Side-Channel Attacks on Printers | periodical = Proceedings of the 19th USENIX Security Symposium | place = Washington, DC| url = http://www.usenix.org/events/sec10/tech/full_papers/Backes.pdf | year = 2010 | isbn = 978-1-931971-77-5 | ref = Back1 }}
Line 208:
* {{cite book| last1 = Osvik | first1 = Dag Arne | title = Topics in Cryptology – CT-RSA 2006 | last2 = Shamir | first2 = Adi | last3 = Tromer | first3 = Eran | book-title = Lecture Notes in Computer Science | volume = 3860 | pages = 1–20 | periodical = Topics in Cryptology CT-RSA | publisher = Springer-Verlag Berlin, Heidelberg | place = San Jose, California, USA | citeseerx = 10.1.1.60.1857 | year = 2006 | issn = 0302-9743 | doi = 10.1007/11605805_1 | isbn = 978-3-540-31033-4 | ref = Sha1| chapter = Cache Attacks and Countermeasures: The Case of AES | series = Lecture Notes in Computer Science }}
* {{Citation| last1 = Page | first1 = Daniel | title = Partitioned cache architecture as a side-channel defence mechanism | periodical = Cryptology ePrint Archive | url = http://eprint.iacr.org/2005/280.pdf | year = 2005 | ref = Pag1 }}
* {{cite book| last1 = Bertoni | first1 = Guido | title = International Conference on Information Technology: Coding and Computing (ITCC'05) – Volume II | last2 = Zaccaria | first2 = Vittorio | last3 = Breveglieri | first3 = Luca | last4 = Monchiero | first4 = Matteo | last5 = Palermo | first5 = Gianluca | place = Washington, DC, USA | volume = 1 | pages = 586–591 | periodical = International Conference on Information Technology: Coding and Computing (ITCC'05) | publisher = IEEE Computer Society, Los Alamitos, California, USA | chapter-url = http://home.dei.polimi.it/gpalermo/papers/ITCC05.pdf | year = 2005 | doi = 10.1109/ITCC.2005.62 | isbn = 978-0-7695-2315-6 | ref = Bert1 | chapter = AES power attack based on induced cache miss and countermeasure | citeseerx = 10.1.1.452.3319 | s2cid = 9364961 }}
=== Chemical ===
Line 216:
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Information Hiding | volume = 1525 | last2 = Anderson | first2 = Ross J. | pages = 124–142 | periodical = Lecture Notes in Computer Science | year = 1998 | doi = 10.1007/3-540-49380-8_10 | isbn = 978-3-540-65386-8 | ref = Kuhn1| chapter = Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations | series = Lecture Notes in Computer Science | citeseerx = 10.1.1.64.6982 }}
* {{Citation| last1 = Van Eck | first1 = Wim | last2 = Laborato | first2 = Neher | title = Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | volume = 4 | issue = 4 | pages = 269–286 | periodical = Computers & Security | url = http://portal.acm.org/citation.cfm?id=7308 | year = 1985 | doi = 10.1016/0167-4048(85)90046-X | ref = Eck1 | citeseerx = 10.1.1.35.1695 }}
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |chapter-url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-1543-4 | ref = Kuhn2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 | s2cid = 2385507 }}
* {{Citation| last1 = Vuagnoux | first1 = Martin | last2 = Pasini | first2 = Sylvain | title = Compromising electromagnetic emanations of wired and wireless keyboards | pages = 1–16 | periodical = In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09) | url = http://www.usenix.org/events/sec09/tech/full_papers/vuagnoux.pdf | year = 2009 | ref = Vuag1}}
* {{cite book| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Unruh | first3 = Dominique | title = Compromising Reflections-or-How to Read LCD Monitors around the Corner | pages = 158–169 | periodical = Proceedings of the IEEE Symposium on Security and Privacy | place = Oakland, California, USA | chapter-url = http://crypto.m2ci.org/unruh/publications/reflections.pdf | year = 2008 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-3168-7 | ref = Back2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 | s2cid = 2385507 }}
=== FireWire ===
Line 231:
=== Temperature ===
* {{Citation| last1 = Skorobogatov| first1 = Sergei | title = Low temperature data remanence in static RAM | journal = Technical Report - University of Cambridge. Computer Laboratory | publisher = University of Cambridge Computer Laboratory | place = Cambridge, UK| url = http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf | year = 2002 | issn = 1476-2986 | ref = Sko1}}
* {{Citation | last1 = Halderman | first1 = J. Alex | last2 = Schoen | first2 = Seth D. | last3 = Heninger | first3 = Nadia | author3-link = Nadia Heninger | last4 = Clarkson | first4 = William | last5 = Paul | first5 = William | last6 = Calandrino | first6 = Joseph A. | last7 = Feldman | first7 = Ariel J. | last8 = Appelbaum | first8 = Jacob | last9 = Felten | first9 = Edward W. | title = Lest We Remember: Cold Boot Attacks on Encryption Keys | book-title = Communications of the ACM – Security in the Browser | volume = 52 | issue = 5 | pages = 45–60 | periodical = Proceedings of the USENIX Security Symposium | publisher = ACM New York, New York, USA | url = http://citp.princeton.edu/pub/coldboot.pdf | year = 2008 | issn = 0001-0782 | doi = 10.1145/1506409.1506429 | isbn = 978-1-931971-60-7 | s2cid = 7770695 | ref = Hald1 | url-status = dead | archive-url = https://web.archive.org/web/20110904213748/http://citp.princeton.edu/pub/coldboot.pdf | archive-date = 2011-09-04 }}
=== Timing attacks ===
Line 239:
=== Other ===
* {{cite book| last1 = Balzarotti | first1 = D.| title = 2008 IEEE Symposium on Security and Privacy (sp 2008)| last2 = Cova| first2 = M.| last3 = Vigna| first3 = G.| pages = 170–183 | periodical = Security and Privacy, 2008. SP 2008. IEEE Symposium on | ___location = Oakland, CA | year = 2008 | issn = 1081-6011 | doi = 10.1109/SP.2008.28 | isbn = 978-0-7695-3168-7 | ref = Balz1| chapter = Clear ''Shot'': Eavesdropping on Keyboard Input from Video| citeseerx = 10.1.1.219.239| s2cid = 1498613}}
* {{Citation| language = fr | last1 = Duflot | first1 = Loïc | title = Contribution à la sécurité des systèmes d'exploitation et des microprocesseurs | url = http://www.ssi.gouv.fr/archive/fr/sciences/fichiers/lti/these-duflot.pdf | year = 2007 | ref = Dufl1}}
|