Electromagnetic Information Leakage and Countermeasure Technique (eBook)
XIX, 246 Seiten
Springer Singapore (Verlag)
978-981-10-4352-9 (ISBN)
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
Taikang Liu:
1) Areas of expertise
l Electromagnetic environment and effect
l Electromagnetic information securityl Electromagnetic protection
2) Working period in these areas:
Over 35 years
3) Education:
Master of Computer Science and Application, Xidian University
4) Experience:
As project leader, Fellow Liu finished dozens of national projects such as 'Analysis on 14 Types of Electromagnetic Environment Effect ', 'Measurement Technology Research on Electromagnetic Information Leakage of System Level', 'General Technology research on Electromagnetic Information Leakage Prevention of Overall Engineering' ,etc.
He also led the team to carry out the theory research and co-published over 20 papers such as: 'Time Domain and Frequency Domain Analysis on Electromagnetic Information Radiation ' , ' Analysis and Process on Electromagnetic Leakage Signal of Computer Video', 'Study on Signal Characteristic Parameters of Computer Video ' ,'Electromagnetic Leakage Test Based on Displayer of EMC Shield Chamber', 'Red and Black Signal Analysis on Electromagnetic Leakage of Computer Mainframe ','Information Security Research on Electromagnetic Radiation Signals of Wireless Keyboard ', 'Analysis and Protection Measures on Electromagnetic Information Leakage of Scanner '.
5) Awards:
Be awarded one grand prize of science and technology of ministerial level, two second prizes of scientific and technological progress of ministerial level, and four third prizes of scientific and technological progress of ministerial level.
Be awarded the title of 'The Young Science and Technology Expert with Outstanding Contributions in the field of National Defense' in 1998.
Be awarded the government subsidy from the state council.
Yongmei Li:
1) Areas of expertise
l EM information leakage and countermeasure
l Information security
l Embedded System
l Artificial Intelligence
2) Working period in these areas:
Over 30 years (16 years as a professor, 8 years as an associate professor, 4 years as a lecturer, and 3 years as a graduate student)
3) Regular lectures at Jimei University
Fundamentals of Compiling
Embedded System
4) Education
Master of Computer Science and Application, Xidian University
Bachelor of Computer Science, Zhengzhou University
5) Experience
1994 - 1996, Visiting Scientist,Frankfurt University of science and technology
1996 - 1999, Visiting Scientist,Brandenburg University of Technology
3. Jinming Liu:
1) Areas of expertise
l EM information leakage and countermeasure
l Information security
l Embedded System
l Artificial Intelligence2) Working period in these areas:
Over 14 years
3) Regular lectures at Jimei University
Electronics and circuit
Embedded System Application
4) Education
Studying for doctor degree at National University of Defense Technology now
Master of auto control, Xiamen University, 2005
Bachelor of auto control, Fuzhou University, 2001
4. Jian Mao
1) Areas of expertise
l Digital signal process
l Information security
l Embedded System
l Artificial Intelligence
2) Working period in these areas:
Over 13 years
3) Regular lectures at Jimei University
Electronics and circuit
Digital signal process
4) Education
Studying for doctor degree at National University of Defense Technology now
Master of auto control, Xiamen University, 2006
Bachelor of auto control, Xiamen University, 2002
5. Jiemin Zhang
1) Areas of expertise
l Information security
l Software programingl Artificial Intelligence
2) Working period in these areas:
Over 23 years
3) Regular lectures at Jimei University
Java language programing
C language programing
4) Education
Master of computer science, Nanjing science and engineeringUniversityThis book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
Erscheint lt. Verlag | 14.5.2019 |
---|---|
Zusatzinfo | XIX, 246 p. 179 illus., 64 illus. in color. |
Sprache | englisch |
Original-Titel | 电磁信息泄漏及防护技术 |
Themenwelt | Informatik ► Theorie / Studium ► Algorithmen |
Informatik ► Weitere Themen ► Hardware | |
Naturwissenschaften | |
Technik ► Bauwesen | |
Technik ► Elektrotechnik / Energietechnik | |
Schlagworte | Electromagnetic (EM) • EM information characteristics • EM information leakage • EM radiation theory • reconstruction and reproduction model • systematic hierarchical countermeasure strategy |
ISBN-10 | 981-10-4352-3 / 9811043523 |
ISBN-13 | 978-981-10-4352-9 / 9789811043529 |
Haben Sie eine Frage zum Produkt? |
Größe: 13,1 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich