{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:25:41Z","timestamp":1725657941720},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866762","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:12:11Z","timestamp":1406754731000},"page":"1-4","source":"Crossref","is-referenced-by-count":10,"title":["Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation"],"prefix":"10.1109","author":[{"given":"Valerica","family":"Bindar","sequence":"first","affiliation":[]},{"given":"Mircea","family":"Popescu","sequence":"additional","affiliation":[]},{"given":"Razvan","family":"Craciunescu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v12i3.4467"},{"key":"16","first-page":"1","author":"hayashi","year":"2013","journal-title":"Introduction to the Special Section on Electromagnetic Information Security"},{"journal-title":"A Guide to Understanding Data Remanence in Automated Information Systems","year":"1991","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v12i2.4006"},{"journal-title":"Blo\ufffdstellende Abstrahlung (Compromising Emanations)","year":"1996","author":"engel","key":"11"},{"journal-title":"Die Datenmafia - Computerspionage und Neue Informationskartelle","year":"1996","author":"koch","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.5"},{"key":"2","first-page":"44","article-title":"Development of countermeasure device to prevent leakage of information caused by unintentional PC display emanations","author":"suzuki","year":"2008","journal-title":"Proc of European Electromagnetics 2008 (EuroEM2008)"},{"journal-title":"Official Gazette No 169\/30 07 1996","year":"0","key":"1"},{"key":"10","first-page":"97","article-title":"TEMPEST - Eine Einfuhrung und Ubersicht zu kompromittierenden Aussendungen, einem Teilaspekt der Informationssicherheit [TEMPEST - An introduction and overview on compromising emanations, one aspect of information security]","author":"kohling","year":"1992","journal-title":"Elektromagnetische Vertraglichkeit\/EMV'92"},{"journal-title":"Cycling Science How Rider and Machine Work Together","year":"2013","author":"glaskin","key":"7"},{"journal-title":"TEMPEST Standards","year":"2014","key":"6"},{"journal-title":"Requirements for the Control of Electromagnetic Interference Characteristics of Subsystems and Equipment","year":"2014","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_13"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"journal-title":"National Security Agency Specification for Shielded Enclosures","year":"1994","key":"8"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","start":{"date-parts":[[2014,5,29]]},"location":"Bucharest, Romania","end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866762.pdf?arnumber=6866762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:56:36Z","timestamp":1490302596000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866762","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}