{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:09:32Z","timestamp":1729678172337,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/revote.2011.6045914","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T11:35:06Z","timestamp":1318937706000},"page":"37-46","source":"Crossref","is-referenced-by-count":3,"title":["Side-channels and eVoting machine security: Identifying vulnerabilities and defining requirements"],"prefix":"10.1109","author":[{"given":"Richard","family":"Frankland","sequence":"first","affiliation":[]},{"given":"Denise","family":"Demirel","sequence":"additional","affiliation":[]},{"given":"Jurlind","family":"Budurushi","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Digitales wahlstift-system. Common Criteria Protection Profile BSI-PP-0031","author":"volkamer","year":"2006","journal-title":"Bundesamt f&#x00FC;r Sicherheit in der Informationstechnik Tech Rep"},{"journal-title":"Final Version","article-title":"Security Target Lite - STARCOS 3.4 Health - AHC C1","year":"2009","key":"ref32"},{"journal-title":"Version 3 1 Revision 3 Final","article-title":"Common Criteria for Information Technology Security Evaluation","year":"2009","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920291"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"ref11","first-page":"251","article-title":"Electromagnetic Analysis: Concrete Results","author":"gandolfi","year":"2001","journal-title":"Proc 1st Int Workshop Cryptographic Hardware and Embedded Systems (CHES)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90157-O"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/11423409_7","article-title":"Electromagnetic Eavesdropping Risks of Flat-Panel Displays","volume":"3424","author":"kuhn","year":"2005","journal-title":"Privacy Enhancing Technologies Ser Lecture Notes in Computer Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2010.5711258"},{"key":"ref16","first-page":"1","article-title":"Compromising electromagnetic emanations of wired and wireless keyboards","author":"vuagnoux","year":"2009","journal-title":"Proceedings of the 18th Conference on USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.20"},{"year":"0","key":"ref28","article-title":"FIPS PUB 140&#x2013;3 (Revised DRAFT 09\/11\/09) - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES"},{"key":"ref4","article-title":"Online Voting Systems for Non-parliamentary Elections - Catalogue of Requirements","author":"hartmann","year":"2004","journal-title":"Physikalisch-Technische Bundesanstalt Braunscheig und Berlin"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-49380-8_10","article-title":"Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations","volume":"1525","author":"kuhn","year":"1998","journal-title":"Information Hiding ser"},{"journal-title":"The U S Election Assistance Commission Tech Rep","article-title":"Voluntary Voting System Guidelines 1.1 - Volume 1","year":"2009","key":"ref3"},{"key":"ref6","article-title":"Bericht &#x00FC;ber eine Kurzuntersuchung zur Einsch&#x00E4;tzung des Risikos kompromittierender RF Abstrahlungen eines digitalen Wahlstifts","author":"kuhn","year":"2007","journal-title":"[German] Emissions report and correspondence to Willi Bei Beh&#x00F6;rde f&#x00FC;r Inneres"},{"year":"0","key":"ref29","article-title":"FIPS PUB 140&#x2013;2 (CHANGE NOTICES (12&#x2013;03&#x2013;2002) - SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01662-2_5"},{"key":"ref8","article-title":"Side-Channel Attacks","volume":"ii","author":"rohatgi","year":"2006","journal-title":"Handbook of Information Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-009-0038-y"},{"journal-title":"Recommendation Rec(2004)11 and explanatory memorandum - Legal operational and technical standards for e-voting","year":"2004","key":"ref2"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","article-title":"Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Print Systems","volume":"1109","author":"kocher","year":"1996","journal-title":"Advances in Cryptology CRYPTO 96 Ser Lecture Notes in Computer Science"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04135-8_11"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1145\/1102120.1102169","article-title":"Keyboard acoustic emanations revisited","author":"zhuang","year":"2005","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"ref24","first-page":"307","article-title":"Acoustic side-channel attacks on printers","author":"backes","year":"2010","journal-title":"Proceedings of the 19th USENIX Conference on Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180436"},{"journal-title":"CISPR","article-title":"CISPR 22:2008 - Information technology equipment Radio disturbance characteristics Limits and methods of measurement","year":"2008","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77493-8_10"}],"event":{"name":"2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE)","start":{"date-parts":[[2011,8,29]]},"location":"Trento, Italy","end":{"date-parts":[[2011,8,29]]}},"container-title":["2011 International Workshop on Requirements Engineering for Electronic Voting Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6036120\/6045909\/06045914.pdf?arnumber=6045914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T04:12:36Z","timestamp":1497931956000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6045914\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/revote.2011.6045914","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}