From post

Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations.

, и . Information Hiding, том 1525 из Lecture Notes in Computer Science, стр. 124-142. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PIN skimmer: inferring PINs through the camera and microphone., и . SPSM@CCS, стр. 67-78. ACM, (2013)Why Cryptosystems Fail.. ACM Conference on Computer and Communications Security, стр. 215-227. (1993)Threat Models over Space and Time: A Case Study of E2EE Messaging Applications., , , , , , , и . CoRR, (2023)How Certification Systems Fail: Lessons from the Ware Report., , и . IEEE Secur. Priv., 10 (6): 40-44 (2012)Jikzi - a new framework for security policy, trusted publishing and electronic commerce., и . Comput. Commun., 23 (17): 1621-1626 (2000)Security economics: a personal perspective.. ACSAC, стр. 139-144. ACM, (2012)Robustness Principles for Public Key Protocols., и . CRYPTO, том 963 из Lecture Notes in Computer Science, стр. 236-247. Springer, (1995)Liability and Computer Security: Nine Principles.. ESORICS, том 875 из Lecture Notes in Computer Science, стр. 231-245. Springer, (1994)Can We Fix the Security Economics of Federated Authentication? (Transcript of Discussion).. Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 33-48. Springer, (2011)SMAPs: Short Message Authentication Protocols., , , и . Security Protocols Workshop, том 10368 из Lecture Notes in Computer Science, стр. 119-132. Springer, (2016)