Mao Jian and Liu Jinming
[1] W van Eck, Electromagnetic radiation from video display units, An Eavesdropping Risk? Computers & Security, 4, 1985, 269–286. [2] J. Mao, Y.M. Li, and J.M. Zhang, Model for electromagnetic information leakage, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 12(2), February 2014, 894–898. [3] J.M. Liu, J. Mao, and J.M. Zhang, The designing of TEMPEST security testing model, TELKOMNIKA: Indonesian Journal of Electrical Engineering, 2014, (2), 866–871. [4] J. Mao, Y.M. Li, and M. Liu, Research for data erasure based on EEPROM, The 5th International Conference on Computer Science & Education, 2010, 1377–1379. [5] J.M. Liu, J. Mao, and Y.M. Li, Designing eraser of secret information in EEPROM. The 5th International Conference on Computer Science & Education, 2010, 535–537. [6] M.G. Kuhn, Security limits for compromising emanations,Cryptographic Hardware and Embedded Systems, LNCS 3659,Springer, 2005, 265–279. [7] M.G. Kuhn, Compromising emanations of LCD TV sets,Electromagnetic Compatibility, IEEE Transactions on, 2013,55(3), 564–570. [8] V. Bindar, M. Popescu, and R. Craciunescu, Aspects of electromagnetic compatibility as a support for communication security based on TEMPEST evaluation, Communications (COMM), 2014 10th International Conference on IEEE, 2014, 1–4. [9] V. Sundaresan, S. Rammohan, and R. Vemuri, Defense against side-channel power analysis attacks on microelectronic systems, Aerospace and Electronics Conference, 2008. NAECON 2008. IEEE National, 2008, 144–150. [10] J.M. Zhang and Y.M. Li, The study of the standardsarchitecture and the standards attributes based on EMCstandards and TEMPEST standards in computer system.The 8th International Conference on Computer Science &Education, Colombo, Sri Lanka, 2013. [11] H. Tanaka, Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. Third International Conference on Information Systems Security, LNCS 4812, Springer, 2007, 167–179. [12] C.Y. Lai, C. Xiang, and T.H. Lee, Input-output transition models for discrete-time switched linear and nonlinear systems, Control and Intelligent Systems, 39(1), 2011, 47–59. [13] T. Ikematsu, Y.I. Hayashi, T. Mizuki, N. Homma, T. Aoki, and H. Sone, Suppression of information leakage from electronic devices based on SNR, Electromagnetic Compatibility (EMC), IEEE International Symposium, 2011. [14] M. Kinugawa, Y.I. Hayashi, T. Mizuki, and H. Sone, Information leakage from the unintentional emissions of an integrated RC oscillator, Electromagnetic Compatibility of Integrated Circuits (EMC Compo), 8th Workshop, 2011. [15] J. Espina, J. Balcells, and A. Arias, EMI model of an AC/AC power converter, Vehicle Power and Propulsion Conference (VPPC), IEEE, 2010, 1–6. [16] Y. Hayashi, T. Sugawara, and Y. Kayano, Information leakage from cryptographic hardware via common-mode current, Electromagnetic Compatibility, IEEE International Symposium, 2010, 109–114.
Important Links:
Go Back