Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an…mehr
This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
Master of Computer Science and Application, Xidian University
4) Experience:
As project leader, Fellow Liu finished dozens of national projects such as "Analysis on 14 Types of Electromagnetic Environment Effect ", "Measurement Technology Research on Electromagnetic Information Leakage of System Level", "General Technology research on Electromagnetic Information Leakage Prevention of Overall Engineering” ,etc.
He also led the team to carry out the theory research and co-published over 20 papers such as: "Time Domain and Frequency Domain Analysis on Electromagnetic Information Radiation " , " Analysis and Process on Electromagnetic Leakage Signal of Computer Video", "Study on Signal Characteristic Parameters of Computer Video " ,"Electromagnetic Leakage Test Based on Displayer of EMC Shield Chamber", "Red and Black Signal Analysis on Electromagnetic Leakage of Computer Mainframe ","Information Security Research on Electromagnetic Radiation Signals of Wireless Keyboard ", "Analysis and Protection Measures on Electromagnetic Information Leakage of Scanner ".
5) Awards:
Be awarded one grand prize of science and technology of ministerial level, two second prizes of scientific and technological progress of ministerial level, and four third prizes of scientific and technological progress of ministerial level.
Be awarded the title of “The Young Science and Technology Expert with Outstanding Contributions in the field of National Defense” in 1998.
Be awarded the government subsidy from the state council.
Yongmei Li:
1) Areas of expertise
l EM information leakage and countermeasure
l Information security
l Embedded System
l Artificial Intelligence
2) Working period in these areas:
Over 30 years (16 years as a professor, 8 years as an associate professor, 4 years as a lecturer, and 3 years as a graduate student)
3) Regular lectures at Jimei University
Fundamentals of Compiling Embedded System
4) Education
Master of Computer Science and Application, Xidian University Bachelor of Computer Science, Zhengzhou University
5) Experience
1994 – 1996, Visiting Scientist,Frankfurt University of science and technology
1996 – 1999, Visiting Scientist,Brandenburg University of Technology
3. Jinming Liu:
1) Areas of expertise
l EM information leakage and countermeasure
l Information security
l Embedded System
l Artificial Intelligence
2) Working period in these areas:
Over 14 years
3) Regular lectures at Jimei University
Electronics and circuit
Embedded System Application
4) Education
Studying for doctordegree at National University of Defense Technology now
Master of auto control, Xiamen University, 2005
Bachelor of auto control, Fuzhou University, 2001
4. Jian Mao
1) Areas of expertise
l Digital signal process
l Information security
l Embedded System
l Artificial Intelligence
2) Working period in these areas:
Over 13 years
3) Regular lectures at Jimei University
Electronics and circuit
Digital signal process
4) Education
Studying for doctor degree at National University of Defense Technology now
Master of auto control, Xiamen University, 2006
Bachelor of auto control, Xiamen University, 2002
5. Jiemin Zhang
1) Areas of expertise
l Information security
l Software programing
l Artificial Intelligence
2) Working period in these areas:
Over 23 years
3) Regular lectures at Jimei University
Java language programing
C language programing
4) Education
Master of computer science, Nanjing science and engineeringUniversity
Inhaltsangabe
Introduction.- Introduction EM information fundamental and leakage mechanism.- EM information interception and reproduction.- EM information leakage countermeasure technique.- EM information leakage countermeasure material.- Computer EM information leakage and countermeasure.- EM information Data processing.- EM information leakage testing.- Standards of EM information leakage and countermeasure.
Introduction.- Introduction EM information fundamental and leakage mechanism.- EM information interception and reproduction.- EM information leakage countermeasure technique.- EM information leakage countermeasure material.- Computer EM information leakage and countermeasure.- EM information Data processing.- EM information leakage testing.- Standards of EM information leakage and countermeasure.
Introduction.- Introduction EM information fundamental and leakage mechanism.- EM information interception and reproduction.- EM information leakage countermeasure technique.- EM information leakage countermeasure material.- Computer EM information leakage and countermeasure.- EM information Data processing.- EM information leakage testing.- Standards of EM information leakage and countermeasure.
Introduction.- Introduction EM information fundamental and leakage mechanism.- EM information interception and reproduction.- EM information leakage countermeasure technique.- EM information leakage countermeasure material.- Computer EM information leakage and countermeasure.- EM information Data processing.- EM information leakage testing.- Standards of EM information leakage and countermeasure.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497