{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:39:06Z","timestamp":1753180746117,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046770","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"537-550","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Televisions, video privacy, and powerline electromagnetic interference"],"prefix":"10.1145","author":[{"given":"Miro","family":"Enev","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Sidhant","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Tadayoshi","family":"Kohno","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Shwetak N.","family":"Patel","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301311"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.25"},{"key":"e_1_3_2_1_3_1","volume-title":"Black Hat Technical Security Conference: USA","author":"Barisani A.","year":"2009","unstructured":"A. Barisani and D. Bianco . Sniffing keystrokes with lasers\/voltmeters: Side channel attacks using optical sampling of mechanical energy and power line leakage . In Black Hat Technical Security Conference: USA , 2009 . A. Barisani and D. Bianco. Sniffing keystrokes with lasers\/voltmeters: Side channel attacks using optical sampling of mechanical energy and power line leakage. In Black Hat Technical Security Conference: USA, 2009."},{"key":"e_1_3_2_1_4_1","volume-title":"Symposium on Electromagnetic Security for Information Protection","author":"Briol R.","year":"1991","unstructured":"R. Briol . Emanations : How to keep your data confidential . In Symposium on Electromagnetic Security for Information Protection , 1991 . R. Briol. Emanations: How to keep your data confidential. In Symposium on Electromagnetic Security for Information Protection, 1991."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_16"},{"key":"e_1_3_2_1_7_1","unstructured":"A. Devices. Analog devices power measure ic for smart meters. Analog.com http:\/\/www.analog.com\/en\/analog-to-digital-converters\/energy-measureme%nt\/products\/index.html 2010.  A. Devices. Analog devices power measure ic for smart meters. Analog.com http:\/\/www.analog.com\/en\/analog-to-digital-converters\/energy-measureme%nt\/products\/index.html 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620581"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864375"},{"key":"e_1_3_2_1_11_1","volume-title":"EPRI Information and Automation Conference","author":"Hart G.","year":"1991","unstructured":"G. Hart . Advances in nonintrusive appliance load monitoring . In EPRI Information and Automation Conference , 1991 . G. Hart. Advances in nonintrusive appliance load monitoring. In EPRI Information and Automation Conference, 1991."},{"volume-title":"http:\/\/cryptome.org\/tempest-old.htm","year":"2000","key":"e_1_3_2_1_12_1","unstructured":"History of Tempest. Cryptome , http:\/\/cryptome.org\/tempest-old.htm , 2000 . History of Tempest. Cryptome, http:\/\/cryptome.org\/tempest-old.htm, 2000."},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology","author":"Kocher P.","year":"1996","unstructured":"P. Kocher . Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems . In Advances in Cryptology , 1996 . P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Advances in Cryptology, 1996."},{"key":"e_1_3_2_1_14_1","volume-title":"Advances in Cryptology","author":"Kocher P.","year":"1999","unstructured":"P. Kocher , J. Jaffe , and B. Jun . Differential power analysis . In Advances in Cryptology , 1999 . P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Advances in Cryptology, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830537"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2011.6038442"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545189"},{"key":"e_1_3_2_1_20_1","unstructured":"J. Lynch and L. Tien. Joint comments of the Center for Democracy & Technology and the Electronic Frontier Foundation on proposed policies and findings pertaining to the smart grid. Comments to the the Public Utilities Commission of the State of California http:\/\/www.eff.org\/files\/CDTEFFJointComment030910.pdf 2010.  J. Lynch and L. Tien. Joint comments of the Center for Democracy & Technology and the Electronic Frontier Foundation on proposed policies and findings pertaining to the smart grid. Comments to the the Public Utilities Commission of the State of California http:\/\/www.eff.org\/files\/CDTEFFJointComment030910.pdf 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79576-6_1"},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Ubiquitous Computing","author":"Patel S.","year":"2007","unstructured":"S. Patel , T. Robertson , J. Kientz , M. Reynolds , and G. Abowd . At the flick of a switch: Detecting and classifying unique electrical events on the residential power line . In International Conference on Ubiquitous Computing , 2007 . S. Patel, T. Robertson, J. Kientz, M. Reynolds, and G. Abowd. At the flick of a switch: Detecting and classifying unique electrical events on the residential power line. In International Conference on Ubiquitous Computing, 2007."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium","author":"Saponas T.","year":"2007","unstructured":"T. Saponas , J. Lester , C. Hartung , S. Agarwal , and T. Kohno . Devices that tell on you: Privacy trends in consumer ubiquitous computing . In USENIX Security Symposium , 2007 . T. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_26_1","volume-title":"Theory and Problems of Probability and Statistics","author":"Spiegel M. R.","year":"1992","unstructured":"M. R. Spiegel . Theory and Problems of Probability and Statistics , chapter 14 (Correlation Theory). McGraw-Hill , 1992 . M. R. Spiegel. Theory and Problems of Probability and Statistics, chapter 14 (Correlation Theory). McGraw-Hill, 1992."},{"key":"e_1_3_2_1_27_1","unstructured":"The benefits of smart meters. California Public Utilities Commision http:\/\/www.cpuc.ca.gov\/PUC\/energy\/Demand+Response\/benefits.htm 2010.  The benefits of smart meters. California Public Utilities Commision http:\/\/www.cpuc.ca.gov\/PUC\/energy\/Demand+Response\/benefits.htm 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Security Symposium","author":"Vuoagnoux M.","year":"2009","unstructured":"M. Vuoagnoux and S. Pasini . Compromising electromagnetic emanations of wired and wireless keyboards . In USENIX Security Symposium , 2009 . M. Vuoagnoux and S. Pasini. Compromising electromagnetic emanations of wired and wireless keyboards. In USENIX Security Symposium, 2009."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium","author":"Wright C. V.","year":"2007","unstructured":"C. V. Wright , L. Ballard , F. Monrose , and G. M. Masson . Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob ? In USENIX Security Symposium , 2007 . C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security Symposium, 2007."}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046770","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046770"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":26,"alternative-id":["10.1145\/2046707.2046770","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046770","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}