期刊文献+

计算机电磁辐射信息识别特性研究 被引量:2

Study on information recognizability of electromagnetic radiation arising from computer
下载PDF
导出
出处 《电波科学学报》 EI CSCD 2004年第5期553-559,共7页 Chinese Journal of Radio Science
基金 ~~
关键词 TEMPEST 信息泄漏 信息泄漏阈值 信息识别度 Character recognition Computer privacy Mathematical models Spectrum analysis
  • 相关文献

参考文献16

  • 1Berke Durak. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL].http://altern. org/berke/tempest/, 2000-08.
  • 2Markus G Kuhn and Ross J Anderson. Soft Tempest:Hidden Data Transmission Using Electromagnetic Emanations [EB/OL]. http://www. cl. cam. ac. uk, 2001-06.
  • 3Ross J Anderson and Markus G. Kuhn. Soft TempestAn Opportunity for NATO [EB/OL]. http://www.cl. cam. ac. uk, 2001-06.
  • 4Van Eck W. Electromagnetic Radiation form Video Display Units: An Eavesdropping Risk? [J]. Computers & Security, 1985,4: 269~286.
  • 5Lu Ling, Nie Yan and Zhang Hongjin. The electromagnetic leakage and protection for computer [C]. Electromagnetic Compatibility Proceedings, 1997 International Symposium on 1997, 21-23 May, 1997:378~382.
  • 6Smulders P The Threat of Information Theft by Reception of Electromagnetic Radiation form RS-232 Cables[J]. Computers & Security, 1990,9: 53~58.
  • 7Demoulin B Kone L and Poudroux C Electromagnetic Radiation of Shielded Data Transmission Lines[C].Symposium on Electromagnetic Security for Information Protection, Rome, Italy, 21-22, Dec, 1991:163~173.
  • 8Raymod J L and Donald U W Speakeasy: The Military Software Radio[J]. IEEE Communications Magazine,May, 1995,33 (5): 56~61.
  • 9Chen Hsing-Yi and Tarn I-Young. Analysis of electromagnetic radiation from a video output amplifier Inside a Monitor by Using FDTD Method[J]. IEEE Trans. EMC, Nov , 1997, 39 (4): 394~397.
  • 10张浩斌,吴昌英,董士伟,许家栋.显示器电磁泄漏信息的接收和重现[J].电波科学学报,2002,17(4):422-425. 被引量:4

二级参考文献17

  • 1BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers[EB/OL], http://altem.org/berke/tempest/, 2000.
  • 2KUHN M G, ANDERSON R J. Soft Tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl.cam.ac.uk/~mgk25/ih98-tempest-slides.pdf,2001.
  • 3ANDERSON R J, KUHN M G Soft TEMPEST-An opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
  • 4VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 69-286.
  • 5LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings,1997 International Symposium on EMC[C]. Beijing, 1997.378-382.
  • 6SMULDERS R The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58.
  • 7DEMOULIN B, KONE L, POUDROUX C. Electromagnetic radiation of shielded data transmission lines[A]. Symposium on Electromagnetic Security for Information Protection[C]. Rome, Italy, 1991.163-173.
  • 8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5): 56-61.
  • 9CHEN H Y, TARN I Y. Analysis of electromagnetic radiation from a video output amplifier inside a monitor by using FDTD method[J]. IEEE Trans EMC, 1997, 39(4): 394-397.
  • 10HARRINGTON R E Time-Harmonic electromagnetic Fields [M]. New York: McGraw-Hill, 2001.

共引文献30

同被引文献22

  • 1乔双,林明秀,宋建中.计算机视频泄漏信息的行同步特征提取技术[J].光电工程,2006,33(11):105-108. 被引量:2
  • 2荀京京,王厚军,向长波,宋建中.一种提取视频电磁泄漏信息同步特征的方法[J].电子科技大学学报,2007,36(3):579-582. 被引量:3
  • 3刘振东,王家礼.基于数字谱分析技术的计算机同步信号的提取[J].电子测量技术,2007,30(9):52-56. 被引量:3
  • 4IEC. CISPR 22-2006, Information Technology Equip- ment-Radio Disturbance Characteristics-Limits and Methods of Measurement[S]. Geneva: CISPR subcom- mittee I, 2006.
  • 5VANECK W. Electromagnetic radiation from display units:an eavesdropping risk? [J]. Computers and Se- curity, 1985,4(4) : 269-286.
  • 6KUHN M G. Security limits for compromising ema- nations[C]// Proceedings of the 7th International Workshop Cryptographic Hardware and Embedded Systems. Berlin : Springer-Verlag, 2005 : 265-279.
  • 7KUHN M G. Compromising emanations: Eavesdrop- ping Risks of Computer Displays[D]. Cambridge : Uni- versity of Cambridge Computer Laboratory,2003.
  • 8DU Yulei,LU Yinghua, ZHANG Jinling, et al. Esti- mation of ea':esdropping distance from conducted e- mission on network cable of a PC[C]// The 6th Asia- Pacific Conference on Environmental Electromagnetics (CEEM). Shanghai, Novomber 6-9,2012 : 347-350.
  • 9SEKIGUCHI H,SETO S. Measurement of computer RGB signals in conducted emission on power leads[J]. Progress in Electromagnetics Research C, 2009, 7:51-64.
  • 10VUAGNOUX M, PASINI S. Compromising electro- magnetic emanations of wired and wireless keyboards [C]// The 18th USENIX Security Symposium. Mont- real,Aug 10-14,2009: 1-16.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部