Login / Signup
Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.
Hidema Tanaka
Published in:
ICISS (2007)
Keyphrases
</>
countermeasures
information security
information leakage
security measures
data analysis