{"title":"触发TEMPEST测试标准更新","authors":"Jinming Liu, Mao Jian","doi":"10.1109/ICCSE.2015.7250270","DOIUrl":null,"url":null,"abstract":"The TEMPEST security testing is to minimize computers and digital equipments from electromagnetic emanations and to achieve information security. With the performance boost of receiver sets, the testing standard must be updated. This paper designs a mathematical model for TEMPEST testing, analyzes the key factor's promotions, and recommends timing for the TEMPEST standard update.","PeriodicalId":311451,"journal":{"name":"2015 10th International Conference on Computer Science & Education (ICCSE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Trigger of TEMPEST testing standard update\",\"authors\":\"Jinming Liu, Mao Jian\",\"doi\":\"10.1109/ICCSE.2015.7250270\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The TEMPEST security testing is to minimize computers and digital equipments from electromagnetic emanations and to achieve information security. With the performance boost of receiver sets, the testing standard must be updated. This paper designs a mathematical model for TEMPEST testing, analyzes the key factor's promotions, and recommends timing for the TEMPEST standard update.\",\"PeriodicalId\":311451,\"journal\":{\"name\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"volume\":\"89 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 10th International Conference on Computer Science & Education (ICCSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSE.2015.7250270\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 10th International Conference on Computer Science & Education (ICCSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSE.2015.7250270","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The TEMPEST security testing is to minimize computers and digital equipments from electromagnetic emanations and to achieve information security. With the performance boost of receiver sets, the testing standard must be updated. This paper designs a mathematical model for TEMPEST testing, analyzes the key factor's promotions, and recommends timing for the TEMPEST standard update.