1. ISO/IEC 27002 "Information technology --- Security techniques --- | Code of practice for information security management ," International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), 2005. Google Scholar
2. X.1051 "Information Security Management System | Requirements for Telecommunications (ISMS-T)," International Telecommunication Union | Telecommunication Standardization Sector (ITU-T) , 2004. Google Scholar
3. RFC2828 "Internet security glossary," Internet Engineering Task Force, 2000. Google Scholar
4. CISPR 22 "Information technology equipment | Radio disturbance characteristics | Limits and methods of measurement," International Electrotechnical Commission (IEC), 2008. Google Scholar
5. IEC 61000-6-3 "Electromagnetic Compatibility (EMC) --- Part 6-3: Generic Standards --- Emission Standard for Residential," Commercial and Light-Industrial Environments International Electrotechnical Commission (IEC), 2006. Google Scholar
6. K.48 "EMC requirements for telecommunication equipment Product family Recommendation ," International Telecommunication Union | Telecommunication Standardization Sector (ITUT), 2006. Google Scholar
7. MIL-STD-461F "Requirements for the control of electromagnetic interference characteristics of subsystems and equipment," Department of Defense Interface Standard (United State of America), 2007. Google Scholar
8. Van Eck, , W., "Electromagnetic radiation from video display units: An eavesdropping risk?," Computers and Security, Vol. 4, No. 4, 269-286, 1985. Google Scholar
9. Kuhn, , M. G., "Compromising emanations: Eavesdropping risks of computer displays," Tech. Rep. UCAM-CL-TR-577, 2003. Google Scholar
10. Vuagnoux, , M. and S. Pasini, "An improved technique to discover compromising electromagnetic emanations," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010. Google Scholar
11. Sekiguchi, , H. and S. Seto, "Estimation of receivable distance for radiated disturbance containing information signal from information technology equipment ," Proc. 2011 IEEE Int. Symp. EMC, Aug. 2011. Google Scholar
12. Sekiguchi, H., "Measurement of radiated computer RGB signals," Progress In Electromagnetics Research C, Vol. 7, 1-12, 2009. Google Scholar
13. Sekiguchi, , H. and S. Seto, "Measurement of computer RGB signals in conducted emission on power leads," Progress In Electromagnetics Research C, Vol. 7, 51-64, 2009. Google Scholar
14. Kuhn, , M. G., "Filtered-tempest fonts,".
doi:http://www.cl.cam.ac.uk/~mgk25/emsec/softtempest-faq.html Google Scholar
15. Beyond IT Co., Ltd., CrypType,.
doi:http://CrypType.com Google Scholar
16. Suzuki, , Y. and Y. Akiyama, "Jamming technique to prevent information leakage caused by unintentional emissions of PC video signals ," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010. Google Scholar
17. Watanabe, T., H. Nagayoshi, T. Urano, T. Uemura, and H. Sako, "Countermeasure for electromagnetic screen image leakage based on color mixing in human brain ," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010. Google Scholar
18. Sekiguchi, , H., "Information leakage of input operation on touch screen monitors caused by electromagnetic noise," Proc. 2010 IEEE Int. Symp. EMC, Jul. 2010. Google Scholar
19. Sekiguchi, , H., "Software countermeasure technique against information leakage threat of button input operations in display image caused by radiated electromagnetic noise from information equipments ," IEICE Trans., Vol. J92-B, No. 7, 1113-1120, 2009. Google Scholar
20. "Monitor Timing Specifications, Version 1.0, Revision 0.8,", 1998. Google Scholar