{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:10:06Z","timestamp":1761808206267},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319922126"},{"type":"electronic","value":"9783319922133"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92213-3_7","type":"book-chapter","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T17:54:27Z","timestamp":1530640467000},"page":"45-51","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Risk: Detection of Compromising Emanations Radiated or Conducted by Display Units"],"prefix":"10.1007","author":[{"given":"R\u0103zvan","family":"B\u0103rtu\u0219ic\u0103","sequence":"first","affiliation":[]},{"given":"Alexandru","family":"Boitan","sequence":"additional","affiliation":[]},{"given":"Simona","family":"Halunga","sequence":"additional","affiliation":[]},{"given":"Mircea","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Valeric\u0103","family":"Bindar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"7_CR1","unstructured":"Kuhn, M.G.: Compromising emanations: eavesdropping risks of computer displays, Technical report (2003). http:\/\/www.cl.cam.ac.uk\/TechReports\/UCAM-CL-TR-577.pdf"},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11545262_20","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"MG Kuhn","year":"2005","unstructured":"Kuhn, M.G.: Security limits for compromising emanations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 265\u2013279. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11545262_20"},{"key":"7_CR3","unstructured":"Kuhn, M.G.: Eavesdropping attacks on computer displays. Inf. Secur. Summit, 24\u201325 (2006). Prague"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1109\/TEMC.2013.2252353","volume":"55","author":"MG Kuhn","year":"2013","unstructured":"Kuhn, M.G.: Compromising emanations of LCD TV sets. IEEE Trans. Electromagn. Compat. 55, 564\u2013570 (2013)","journal-title":"IEEE Trans. Electromagn. Compat."},{"key":"7_CR5","unstructured":"Katamreddy, S.: Experimental testbed for electromagnetic analysis doctoral dissertation. George Mason University (2016)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Kasmi, C., Esteves, J.L., Armstrong, K.: EMC\/EMI and functional safety, methodology to characterize effects of interferences on devices. In: IEEE 2016 Asia-Pacific International Symposium on Electromagnetic Compatibility (APEMC), vol. 1, pp. 1178\u20131180 (2016)","DOI":"10.1109\/APEMC.2016.7522979"},{"key":"7_CR7","series-title":"Springer Optimization and Its Applications","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-51500-7_5","volume-title":"Operations Research, Engineering, and Cyber Security","author":"C Christopoulos","year":"2017","unstructured":"Christopoulos, C.: Electromagnetic compatibility (EMC) in challenging environments. In: Daras, N.J., Rassias, T.M. (eds.) Operations Research, Engineering, and Cyber Security. SOIA, vol. 113, pp. 95\u2013115. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-51500-7_5"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Jian, M., Jinming, L.: Information leakage from computer based on electromagnetic radiation. Control Intell. Syst. 43(2) (2016)","DOI":"10.2316\/Journal.201.2015.2.201-2699"},{"issue":"4","key":"7_CR9","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W Eck Van","year":"1985","unstructured":"Van Eck, W.: Electromagnetic radiation from video display units: an eavesdropping risk? Comput. Secur. 4(4), 269\u2013286 (1985)","journal-title":"Comput. Secur."},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2528\/PIERC08122201","volume":"7","author":"H Sekiguchi","year":"2009","unstructured":"Sekiguchi, H., Seto, S.: Measurement of radiated computer RGB signals. Prog. Electromagn. Res. C 7, 1\u201312 (2009)","journal-title":"Prog. Electromagn. Res. C"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"B\u00eendar, V., Popescu, M., Craciunescu, R.: Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation. In: 2014 10th International Conference on Communications (COMM), Bucharest, pp. 1\u20134 (2014)","DOI":"10.1109\/ICComm.2014.6866762"},{"key":"7_CR12","unstructured":"ITU-T K.84: test methods and guide against information leaks through unintentional electromagnetic emissions (2011)"},{"key":"7_CR13","unstructured":"ITU-T K.87: guide for the application of electromagnetic security requirements (2016)"},{"key":"7_CR14","unstructured":"https:\/\/www.sans.org\/reading-room\/whitepapers\/privacy\/introduction-tempest-981 . Accessed Apr 2017"},{"key":"7_CR15","unstructured":"http:\/\/tinyvga.com\/vga-timing . Accessed Apr 2017"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Future Access Enablers for Ubiquitous and Intelligent Infrastructures"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92213-3_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T09:04:59Z","timestamp":1571562299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92213-3_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319922126","9783319922133"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92213-3_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}