Zhang Jiemin and Zhang Zidong
[1] H. Yan, Z.H. Dong, and W.J. Han, Prevention military network electromagnetic information security technology. (Beijing: National Defence Industry Press, 2010). [2] F. Han, Computer electromagnetic information leakage and prevention. (Beijing: Science Press, 1993). [3] T.K. Liu, Y.M. Li, J.M. Zhang, et al., Electromagnetic information leakage and countermeasure technique. (Beijing: National Defence Industry Press, 2015). [4] W.H. Yang, Research on a practical computer radiation information interception technology, Doctoral Dissertation, Beijing University of Posts and Telecommunications, Beijing, 2011. [5] Electromagnetic Pulse (EMP) and Tempest protection forfacilities [EB/OL], http://www.jya.com/emp.htm. [6] Y. Lai Chow, Xiang Cheng, and H. Lee Tong, Input-outputtransition models for discrete-time switched linear and non-linear systems, Control and Intelligent Systems, 39(1), 2011, 47–59. [7] W. Li, Soft-tempest research and implementation of Chinese characters, Computer Engineering and Design, 22(6), 2001, 43–47. [8] J. Chu, G.L. Ding, et al., Design and realization of differential power analysis for DES, Computer Systems, 1(28), 2007, 11–14. [9] T. Kasper, et al., EM Side-channel attacks on commercial contactless smartcards using low-cost equipment, Horst G Institute for IT Security Ruhr University Bochum, Germany, H.Y. Youm and M. Yung (Eds.), WISA 2009, LNCS 5932: 79–93. [10] L. Chang, P. Xiong, Research on the selection function in diferential power analysis, Information Technology, 3, 2012, 108–110. [11] H. Sekiguchi, Information leakage of input operation on touch screen monitors caused by electromagnetic noise, IEEE 978-1-4244-6307-72010.
Important Links:
Go Back