Login / Signup

Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures.

Hidema Tanaka
Published in: ICISS (2007)
Keyphrases
  • countermeasures
  • information security
  • information leakage
  • security measures
  • data analysis