Content deleted Content added
m →Temperature: Remove unnecessary |display-author= parameters from CS1 templates; using AWB |
Citation bot (talk | contribs) m [579]Alter: doi_brokendate. Add: display-authors. You can use this bot yourself. Report bugs here. |
||
Line 217:
=== Electromagnetic ===
* {{Citation| last1 = Kuhn | first1 = Markus G. | title = Information Hiding | volume = 1525 | last2 = Anderson | first2 = Ross J. | pages = 124–142 | periodical = Lecture Notes in Computer Science | url = http://www.springerlink.com/content/dm6kgf2p4mnrp0uv/ | year = 1998 | doi = 10.1007/3-540-49380-8_10 | isbn = 3-540-65386-4 | ref = Kuhn1| chapter = Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations | series = Lecture Notes in Computer Science }}
* {{Citation| last1 = Van Eck | first1 = Wim | last2 = Laborato | first2 = Neher | title = Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? | pages = 269–286 | periodical = Computers & Security | url = http://portal.acm.org/citation.cfm?id=7308 | year = 1985 | doi = 10.1016/0167-4048(85)90046-Xv | isbn = | ref = Eck1| doi_brokendate =
* {{Citation| last1 = Kuhn | first1 = Markus G. | title = Proceedings 2002 IEEE Symposium on Security and Privacy | pages = 3– | periodical = Proceedings of the 2002 IEEE Symposium on Security and Privacy |url=http://portal.acm.org/citation.cfm?id=829514.830537 | year = 2002 | doi = 10.1109/SECPRI.2002.1004358 | isbn = 0-7695-1543-6 | ref = Kuhn2| chapter = Optical time-___domain eavesdropping risks of CRT displays }}
* {{Citation| last1 = Vuagnoux | first1 = Martin | last2 = Pasini | first2 = Sylvain | title = Compromising electromagnetic emanations of wired and wireless keyboards | pages = 1–16 | periodical = In Proceedings of the 18th conference on USENIX security symposium (SSYM'09) | url = http://www.usenix.org/events/sec09/tech/full_papers/vuagnoux.pdf | year = 2009 | ref = Vuag1}}
Line 233:
=== Temperature ===
* {{Citation| last1 = Skorobogatov| first1 = Sergei | title = Low temperature data remanence in static RAM | publisher = University of Cambridge Computer Laboratory | place = Cambridge, UK| url = http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-536.pdf | year = 2002 | issn = 1476-2986 | ref = Sko1}}
* {{Citation| last1 = Halderman | first1 = J. Alex | last2 = Schoen | first2 = Seth D. | last3 = Heninger | first3 = Nadia | last4 = Clarkson | first4 = William | last5 = Paul | first5 = William | last6 = Calandrino | first6 = Joseph A. | last7 = Feldman | first7 = Ariel J. | last8 = Appelbaum | first8 = Jacob | last9 = Felten | first9 = Edward W. | title = Lest We Remember: Cold Boot Attacks on Encryption Keys | booktitle = Communications of the ACM - Security in the Browser | volume = 52 | issue = 5 | pages = 45–60 | periodical = Proceedings of the USENIX Security Symposium | publisher = ACM New York, New York, USA | url = http://citp.princeton.edu/pub/coldboot.pdf | year = 2008 | issn = 0001-0782 | doi = 10.1145/1506409.1506429 | isbn = 978-1-931971-60-7 | ref = Hald1 | display-authors = 9 }}
=== Timing attacks ===
|