1. [1] ITU-T SG5, “Test methods and guide against information leak through unintentional EM emission,” Rec. K.84, International Telecommunication Union, Geneva, 2011.
2. [2] M.G. Kuhn, “Compromising emanations: Eavesdropping risks of computer displays,” Technical Report, UCAM-CL-TR-577, Dec. 2003.
3. [3] M. Vuagnoux and S. Pasini, “Compromising electromagnetic emanation of wired and wireless keyboards,” 18th Int. Symp. USENIX, pp.1-16, March 2009.
4. [4] T. Tosaka, K. Taira, Y. Yamanaka, K. Fukunaga, A. Nishikata, and M. Hattori, “Reconstruction of printed image using electromagnetic disturbance from laser printer,” IEICE Trans. Commun., vol.E90-B, no.3, pp.711-715, March 2007.
5. [5] D.G. Sun, W.Q. Huang, and Z.W. Zhao, “Modeling the radiated compromising emanation for digital channel,” IEEE Conf. on Robot., Autom. and Mechatronics, pp.1-5, Dec. 2006.