1Berke Durak. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL].http://altern. org/berke/tempest/, 2000-08.
2Markus G Kuhn and Ross J Anderson. Soft Tempest:Hidden Data Transmission Using Electromagnetic Emanations [EB/OL]. http://www. cl. cam. ac. uk, 2001-06.
3Ross J Anderson and Markus G. Kuhn. Soft TempestAn Opportunity for NATO [EB/OL]. http://www.cl. cam. ac. uk, 2001-06.
4Van Eck W. Electromagnetic Radiation form Video Display Units: An Eavesdropping Risk? [J]. Computers & Security, 1985,4: 269~286.
5Lu Ling, Nie Yan and Zhang Hongjin. The electromagnetic leakage and protection for computer [C]. Electromagnetic Compatibility Proceedings, 1997 International Symposium on 1997, 21-23 May, 1997:378~382.
6Smulders P The Threat of Information Theft by Reception of Electromagnetic Radiation form RS-232 Cables[J]. Computers & Security, 1990,9: 53~58.
7Demoulin B Kone L and Poudroux C Electromagnetic Radiation of Shielded Data Transmission Lines[C].Symposium on Electromagnetic Security for Information Protection, Rome, Italy, 21-22, Dec, 1991:163~173.
8Raymod J L and Donald U W Speakeasy: The Military Software Radio[J]. IEEE Communications Magazine,May, 1995,33 (5): 56~61.
9Chen Hsing-Yi and Tarn I-Young. Analysis of electromagnetic radiation from a video output amplifier Inside a Monitor by Using FDTD Method[J]. IEEE Trans. EMC, Nov , 1997, 39 (4): 394~397.
1BERKE D. Hidden data transmission by controlling electromagnetic emanations of computers[EB/OL], http://altem.org/berke/tempest/, 2000.
2KUHN M G, ANDERSON R J. Soft Tempest: hidden data transmission using electromagnetic emanations[EB/OL]. http://www.cl.cam.ac.uk/~mgk25/ih98-tempest-slides.pdf,2001.
3ANDERSON R J, KUHN M G Soft TEMPEST-An opportunity for NATO[EB/OL]. http://www.cl.cam.ac.uk, May, 2000.
4VAN E W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 69-286.
5LU L, NIE Y, ZHANG H J. The electromagnetic leakage and protection for computer[A]. Electromagnetic Compatibility Proceedings,1997 International Symposium on EMC[C]. Beijing, 1997.378-382.
6SMULDERS R The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58.
7DEMOULIN B, KONE L, POUDROUX C. Electromagnetic radiation of shielded data transmission lines[A]. Symposium on Electromagnetic Security for Information Protection[C]. Rome, Italy, 1991.163-173.
8LACKEY R J, UPMAL D W. Speakeasy: the military software radio[J]. IEEE Communications Magazine, 1995, 33(5): 56-61.
9CHEN H Y, TARN I Y. Analysis of electromagnetic radiation from a video output amplifier inside a monitor by using FDTD method[J]. IEEE Trans EMC, 1997, 39(4): 394-397.
10HARRINGTON R E Time-Harmonic electromagnetic Fields [M]. New York: McGraw-Hill, 2001.
4IEC. CISPR 22-2006, Information Technology Equip- ment-Radio Disturbance Characteristics-Limits and Methods of Measurement[S]. Geneva: CISPR subcom- mittee I, 2006.
5VANECK W. Electromagnetic radiation from display units:an eavesdropping risk? [J]. Computers and Se- curity, 1985,4(4) : 269-286.
6KUHN M G. Security limits for compromising ema- nations[C]// Proceedings of the 7th International Workshop Cryptographic Hardware and Embedded Systems. Berlin : Springer-Verlag, 2005 : 265-279.
7KUHN M G. Compromising emanations: Eavesdrop- ping Risks of Computer Displays[D]. Cambridge : Uni- versity of Cambridge Computer Laboratory,2003.
8DU Yulei,LU Yinghua, ZHANG Jinling, et al. Esti- mation of ea':esdropping distance from conducted e- mission on network cable of a PC[C]// The 6th Asia- Pacific Conference on Environmental Electromagnetics (CEEM). Shanghai, Novomber 6-9,2012 : 347-350.
9SEKIGUCHI H,SETO S. Measurement of computer RGB signals in conducted emission on power leads[J]. Progress in Electromagnetics Research C, 2009, 7:51-64.
10VUAGNOUX M, PASINI S. Compromising electro- magnetic emanations of wired and wireless keyboards [C]// The 18th USENIX Security Symposium. Mont- real,Aug 10-14,2009: 1-16.