Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages. Andrikos, C., Batina, L., Chmielewski, L., Lerman, L., Mavroudis, V., Papagiannopoulos, K., Perin, G., Rassias, G., & Sonnino, A. In Galbraith, S. D. & Moriai, S., editors, Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III, volume 11923, of Lecture Notes in Computer Science, pages 285–314, 2019. Springer. Paper doi bibtex @inproceedings{DBLP:conf/asiacrypt/AndrikosBCLMPPR19,
author = {Christos Andrikos and
Lejla Batina and
Lukasz Chmielewski and
Liran Lerman and
Vasilios Mavroudis and
Kostas Papagiannopoulos and
Guilherme Perin and
Giorgos Rassias and
Alberto Sonnino},
editor = {Steven D. Galbraith and
Shiho Moriai},
title = {Location, Location, Location: Revisiting Modeling and Exploitation
for Location-Based Side Channel Leakages},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
on the Theory and Application of Cryptology and Information Security,
Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
series = {Lecture Notes in Computer Science},
volume = {11923},
pages = {285--314},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-34618-8\_10},
doi = {10.1007/978-3-030-34618-8\_10},
timestamp = {Fri, 22 Nov 2019 13:53:07 +0100},
biburl = {https://dblp.org/rec/conf/asiacrypt/AndrikosBCLMPPR19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"F7QJSAt6PhbM4E49B","bibbaseid":"andrikos-batina-chmielewski-lerman-mavroudis-papagiannopoulos-perin-rassias-etal-locationlocationlocationrevisitingmodelingandexploitationforlocationbasedsidechannelleakages-2019","author_short":["Andrikos, C.","Batina, L.","Chmielewski, L.","Lerman, L.","Mavroudis, V.","Papagiannopoulos, K.","Perin, G.","Rassias, G.","Sonnino, A."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Christos"],"propositions":[],"lastnames":["Andrikos"],"suffixes":[]},{"firstnames":["Lejla"],"propositions":[],"lastnames":["Batina"],"suffixes":[]},{"firstnames":["Lukasz"],"propositions":[],"lastnames":["Chmielewski"],"suffixes":[]},{"firstnames":["Liran"],"propositions":[],"lastnames":["Lerman"],"suffixes":[]},{"firstnames":["Vasilios"],"propositions":[],"lastnames":["Mavroudis"],"suffixes":[]},{"firstnames":["Kostas"],"propositions":[],"lastnames":["Papagiannopoulos"],"suffixes":[]},{"firstnames":["Guilherme"],"propositions":[],"lastnames":["Perin"],"suffixes":[]},{"firstnames":["Giorgos"],"propositions":[],"lastnames":["Rassias"],"suffixes":[]},{"firstnames":["Alberto"],"propositions":[],"lastnames":["Sonnino"],"suffixes":[]}],"editor":[{"firstnames":["Steven","D."],"propositions":[],"lastnames":["Galbraith"],"suffixes":[]},{"firstnames":["Shiho"],"propositions":[],"lastnames":["Moriai"],"suffixes":[]}],"title":"Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages","booktitle":"Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III","series":"Lecture Notes in Computer Science","volume":"11923","pages":"285–314","publisher":"Springer","year":"2019","url":"https://doi.org/10.1007/978-3-030-34618-8\\_10","doi":"10.1007/978-3-030-34618-8_10","timestamp":"Fri, 22 Nov 2019 13:53:07 +0100","biburl":"https://dblp.org/rec/conf/asiacrypt/AndrikosBCLMPPR19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/asiacrypt/AndrikosBCLMPPR19,\n author = {Christos Andrikos and\n Lejla Batina and\n Lukasz Chmielewski and\n Liran Lerman and\n Vasilios Mavroudis and\n Kostas Papagiannopoulos and\n Guilherme Perin and\n Giorgos Rassias and\n Alberto Sonnino},\n editor = {Steven D. Galbraith and\n Shiho Moriai},\n title = {Location, Location, Location: Revisiting Modeling and Exploitation\n for Location-Based Side Channel Leakages},\n booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference\n on the Theory and Application of Cryptology and Information Security,\n Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},\n series = {Lecture Notes in Computer Science},\n volume = {11923},\n pages = {285--314},\n publisher = {Springer},\n year = {2019},\n url = {https://doi.org/10.1007/978-3-030-34618-8\\_10},\n doi = {10.1007/978-3-030-34618-8\\_10},\n timestamp = {Fri, 22 Nov 2019 13:53:07 +0100},\n biburl = {https://dblp.org/rec/conf/asiacrypt/AndrikosBCLMPPR19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Andrikos, C.","Batina, L.","Chmielewski, L.","Lerman, L.","Mavroudis, V.","Papagiannopoulos, K.","Perin, G.","Rassias, G.","Sonnino, A."],"editor_short":["Galbraith, S. D.","Moriai, S."],"key":"DBLP:conf/asiacrypt/AndrikosBCLMPPR19","id":"DBLP:conf/asiacrypt/AndrikosBCLMPPR19","bibbaseid":"andrikos-batina-chmielewski-lerman-mavroudis-papagiannopoulos-perin-rassias-etal-locationlocationlocationrevisitingmodelingandexploitationforlocationbasedsidechannelleakages-2019","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-030-34618-8\\_10"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/QK7udauu9oYiG86Rs/bib.bib","dataSources":["ZuojF5jycEf8Xjgko","8gxn7AaKRh7GxNQNx","9LEB4ahCAz8Pkq58E","ZsvDCPRnhBRRCnWQ5"],"keywords":[],"search_terms":["location","location","location","revisiting","modeling","exploitation","location","based","side","channel","leakages","andrikos","batina","chmielewski","lerman","mavroudis","papagiannopoulos","perin","rassias","sonnino"],"title":"Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages","year":2019}