Content deleted Content added
m Reverted edits by 2405:4802:7053:1D80:D965:8E3F:BCA:9CB6 (talk) (HG) (3.4.10) |
Citation bot (talk | contribs) Alter: title, year. Add: s2cid. | Use this bot. Report bugs. | #UCB_CommandLine 911/9214 |
||
Line 218:
* {{cite book| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |chapter-url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 978-0-7695-1543-4 | ref = Kuhn2| chapter = Optical time-___domain eavesdropping risks of CRT displays | citeseerx = 10.1.1.7.5870 | s2cid = 2385507 }}
* {{Citation| last1 = Vuagnoux | first1 = Martin | last2 = Pasini | first2 = Sylvain | title = Compromising electromagnetic emanations of wired and wireless keyboards | pages = 1–16 | periodical = In Proceedings of the 18th Conference on USENIX Security Symposium (SSYM'09) | url = http://www.usenix.org/events/sec09/tech/full_papers/vuagnoux.pdf | year = 2009 | ref = Vuag1}}
* {{cite book| last1 = Backes | first1 = Michael | last2 = Dürmuth | first2 = Markus | last3 = Unruh | first3 = Dominique | title =
=== FireWire ===
Line 235:
=== Timing attacks ===
* {{Citation| last1 = Song | first1 = Dawn Xiaodong | last2 = Wagner | first2 = David | last3 = Tian | first3 = Xuqing | title = Timing analysis of keystrokes and timing attacks on SSH | volume = 10 | pages = 337–352 | place = Washington, D.C., USA | periodical = Proceedings of the 10th Conference on USENIX Security Symposium | publisher = USENIX Association Berkeley, California, USA | url = http://www.usenix.org/events/sec01/full_papers/song/song.pdf | year = 2001 | ref = Song1}}
* {{cite book| last1 = Kocher | first1 = Paul C.| title = Advances in Cryptology – CRYPTO '96| volume = 1109 | pages = 104–113 | periodical = Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology – CRYPTO '96 | series = Lecture Notes in Computer Science | publisher = Springer-Verlag, London, UK | place = Santa Barbara, California, USA | citeseerx = 10.1.1.40.5024 | year = 1996 | doi = 10.1007/3-540-68697-5_9 | isbn = 978-3-540-61512-5 | ref = Koch1| chapter = Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems| s2cid = 15475583}}
* {{Citation| last1 = Brumley | first1 = David | last2 = Boneh | first2 = Dan | title = Remote timing attacks are practical | volume = 12 | issue = 5 | pages = 701 | periodical = Proceedings of the 12th Conference on USENIX Security Symposium SSYM'03 | publisher = USENIX Association Berkeley, California, USA | place = Washington, DC, USA | url = http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf | year = 2003 | doi = 10.1016/j.comnet.2005.01.010 | ref = Brum1| citeseerx = 10.1.1.12.2615 }}
|