THE NEW PROCESSED DATA BASED METHOD OF INFORMATION SECURITY FOR INTELLIGENT EQUIPMENT

Zhang Jiemin and Zhang Zidong

References

  1. [1] H. Yan, Z.H. Dong, and W.J. Han, Prevention military network electromagnetic information security technology. (Beijing: National Defence Industry Press, 2010).
  2. [2] F. Han, Computer electromagnetic information leakage and prevention. (Beijing: Science Press, 1993).
  3. [3] T.K. Liu, Y.M. Li, J.M. Zhang, et al., Electromagnetic information leakage and countermeasure technique. (Beijing: National Defence Industry Press, 2015).
  4. [4] W.H. Yang, Research on a practical computer radiation information interception technology, Doctoral Dissertation, Beijing University of Posts and Telecommunications, Beijing, 2011.
  5. [5] Electromagnetic Pulse (EMP) and Tempest protection forfacilities [EB/OL], http://www.jya.com/emp.htm.
  6. [6] Y. Lai Chow, Xiang Cheng, and H. Lee Tong, Input-outputtransition models for discrete-time switched linear and non-linear systems, Control and Intelligent Systems, 39(1), 2011, 47–59.
  7. [7] W. Li, Soft-tempest research and implementation of Chinese characters, Computer Engineering and Design, 22(6), 2001, 43–47.
  8. [8] J. Chu, G.L. Ding, et al., Design and realization of differential power analysis for DES, Computer Systems, 1(28), 2007, 11–14.
  9. [9] T. Kasper, et al., EM Side-channel attacks on commercial contactless smartcards using low-cost equipment, Horst G Institute for IT Security Ruhr University Bochum, Germany, H.Y. Youm and M. Yung (Eds.), WISA 2009, LNCS 5932: 79–93.
  10. [10] L. Chang, P. Xiong, Research on the selection function in diferential power analysis, Information Technology, 3, 2012, 108–110.
  11. [11] H. Sekiguchi, Information leakage of input operation on touch screen monitors caused by electromagnetic noise, IEEE 978-1-4244-6307-72010.

Important Links:

Go Back