期刊文献+

计算机视频信息的电磁辐射泄漏的反截获研究 被引量:1

The study of the anti-eavesdropping the electromagnetic leakage from computer video signal
在线阅读 下载PDF
导出
摘要 本文首先分析了计算机视频信息的电磁辐射泄漏的产生机理,进而分析了其截获原理,最后提出了一些视频电磁泄漏反截获的方法。 The principle of the electromagnetic leakage from computer video signal was analyzed In this paper. Moreover, the principle of eavesdropping the leakage were analyzed. At last,some methods were brought forward, to prevent the leakage.
出处 《电子质量》 2007年第2期54-58,共5页 Electronics Quality
关键词 电磁泄漏 截获 串行信号 并行信号 Electromagnetic leakage Eavesdropping Serial signal Parallel signal
  • 相关文献

参考文献13

二级参考文献26

  • 1田文超,贾建援.DMD弹性片同基底之间粘着力计算[J].仪器仪表学报,2003,24(z1):528-530. 被引量:2
  • 2杨顺辽,卢凌,聂明新,李晟,梁军,宋文武,吴楠.基于微波暗室的计算机电磁泄漏测试[J].武汉理工大学学报(交通科学与工程版),2004,28(5):725-728. 被引量:4
  • 3余祖荣.TEMPEST技术国内外发展概况[J].计算机与信息处理标准化,1996(3):52-56. 被引量:2
  • 4[1]Berke Durak. Hidden data transmission by controlling electromagnetic emanations of computers [EB/OL]. http://altern.org/berke/tempest/, 2000
  • 5[2]Markus G. Kuhn and Ross J. Anderson. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations [A]. in David Aucsmith(ED), Information Hidding, second International Workshop [C] , USA: Portland, Oregon, 15-17, April, 1998.LNCS 1525, 124-142
  • 6[3]Highland H. J. TEMPEST over Leaking Computers [J]. Computers & Security, 1988, 13 (7): 457-458
  • 7[4]ZHANG Hongxin, Lu Yinghua. A Study on the Recognizability of Electromagnetic Leakage Information from Computer [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou: 2003, 11. 65-68
  • 8[5]ZHANG Hongxin, Lu Yinghua. The Research on Video Signal Electromagnetic Radiation of Computer Based on Near-Field Testing Data [A]. The third ASIA-PACIFIC conference on environmental electromagnetics[C], Hangzhou :2003, 11. 69-72
  • 9[15]Smulders P. The Threat of Information Theft by Reception of Electromagnetic Radiation form RS-232 Cables [J]. Computers & Security, 1990, vol. 9:53-58
  • 10[16]ZHANG Hongxin, Lu Yinghua. The Study on the Recognizability of Electromagnetic Leakage Information arising from Computer [J].The Journal of China universities of Posts and Telecommunications. 2004, 11(3)

共引文献34

同被引文献12

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部