{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:33:13Z","timestamp":1762252393613},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528278","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T14:27:58Z","timestamp":1470407278000},"page":"513-518","source":"Crossref","is-referenced-by-count":7,"title":["Estimate of minimum attenuation level for a TEMPEST shielded enclosure"],"prefix":"10.1109","author":[{"given":"Mircea","family":"Popescu","sequence":"first","affiliation":[]},{"given":"Valerica","family":"Bindar","sequence":"additional","affiliation":[]},{"given":"Razvan","family":"Craciunescu","sequence":"additional","affiliation":[]},{"given":"Octavian","family":"Fratu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77086-2_13"},{"key":"ref12","first-page":"97","article-title":"TEMPEST - eine Einfuhrung und Ubersicht zu kompromittierenden Aussendungen, einem Teilaspekt der Informationssicherheit","author":"kohling","year":"1992","journal-title":"Elektromagnetische Vertraglichkeit EMV'92 Stuttgart"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v12i2.4006"},{"year":"1997","key":"ref14","article-title":"CISPR 22, International Electrotechnical Commission (IEC)"},{"year":"2012","key":"ref15"},{"article-title":"Antenna Theory","year":"2003","author":"balanis","key":"ref16"},{"year":"2013","key":"ref17","article-title":"International Telecommunication Union"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v12i3.4467"},{"key":"ref19","first-page":"44","article-title":"Development of Countermeasure Device to Prevent Leakage of Information Caused by Unintentional PC Display Emanations","author":"suzuki","year":"2008","journal-title":"Proceedings of European Electromagnetics 2008 - EuroEM 2008"},{"key":"ref28","article-title":"Security aspects of RFID communication systems","author":"b\u00eendar","year":"2015","journal-title":"Proc SPIE 9258 Advanced Topics in Optoelectronics Microelectronics and Nanotechnologies"},{"year":"1994","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2528\/PIERC09030907"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"ref6","first-page":"481","article-title":"Considerations Regarding Shielding Effectiveness and Testing of Electromagnetic Protected","author":"b\u00eendar","year":"2014","journal-title":"Proceedings of 10th International Conference on Communications - COMM 2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866762"},{"key":"ref8","first-page":"9","article-title":"Countermeasure Technique for Preventing Information Leakage Caused by Unintentional PC Display Emanations","author":"suzuki","year":"2009","journal-title":"Proceedings of 2009 International Symposium on EMC"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_7"},{"journal-title":"Decision of Romanian Government no 353\/2002","year":"2002","key":"ref9"},{"key":"ref1","article-title":"Compromising emanations: eavesdropping risks of computer displays","author":"kuhn","year":"2003","journal-title":"Computer Laboratory Univ of Cambridge Cambridge U K Tech Rep UCAM-CL-TR-577"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/telkomnika.v11i5.2562"},{"key":"ref22","first-page":"164","article-title":"Information Leakage from the Unintentional Emissions of An Integrated RC Cscillator","author":"kinugawa","year":"2011","journal-title":"Electromagnetic Compatibility of Integrated Circuits (EMC Compo) 8th Workshop"},{"key":"ref21","first-page":"112","article-title":"Suppression of information leakage from electronic devices based on SNR","author":"taishi","year":"2011","journal-title":"IEEE Int Symp On Electromagnetic Compatibility (EMC)"},{"year":"2011","key":"ref24","article-title":"Guide, for the application of electromagnetic security requirements"},{"year":"2003","key":"ref23","article-title":"Security in Telecommunications and Information Technology &#x2014; An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.2528\/PIERC08122201"},{"year":"2011","key":"ref25","article-title":"Test, methods and guide against information leaks through unintentional electromagnetic emissions"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528278.pdf?arnumber=7528278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,25]],"date-time":"2016-09-25T22:12:27Z","timestamp":1474841547000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528278\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528278","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}