[1] Kuhm Markus G, Anderson Ross J. Soft tempest:hidden data transmission using electromagnetic emanations[A]. Information Hidding, second International Workshop[C], USA: Portland, Oregon, 1998. LNCS 1 525: 124-142. [2] van Eck W. Electromagnetic radiation form video display units: an eavesdropping risk?[J]. Computers & Security, 1985, 4: 269-286. [3] Smulders P. The threat of information theft by reception of electromagnetic radiation form RS-232 cables[J]. Computers & Security, 1990, 9: 53-58. [4] 韩 放. 计算机信息电磁泄漏与防护[M]. 北京:科学出版社, 1993.18-38. [5] 黄永明,吕英华.室内无线传播中一种混合建模方法的改进Ⅱ[J].北京邮电大学学报,2004,27(1):13-17. [6] Zhang Hongxin, Lu Yinghua, Huang Yongming, Yu Xueping. Analysis of slot-eavesdrop of coaxial cable with FDTD method[A]. IEEE 3rd International Symposium on Electromagnetic Compatibility[C]. 2002. 83-86. [7] 张洪欣, 吕英华. PML在三维柱坐标系下的应用及脉冲天线数值模拟[J]. 遥测遥控, 2003, 24(1): 15-19. [8] Bladel J V. Singular electromagnetic fields and sources[M]. U K Oxford, 1991.117-129. [9] HarringtonF. Time-harmonic electromagnetic fields[M]. New York:McGraw-Hill, 2001.95-128. [10] Liang C H, Cheng D K. Electromagnetic fields coupling into caving with slot-aperture under resonant conditions[J]. IEEE trans AP, 1982,30(4):664-672. [11] Harrington F. Field computation by moment methods[M]. New York:Macmillan, 1968. 7-15. [12] 佘显烨. 微波集成电路的格林函数法计算[M]. 北京: 国防工业出版社. 1996. 24-25. [13] Bird T S. Accurate asymptotic solultion for the surface field due tospertures in a conducting cylinder[J]. IEEE trans AP, 1985,33(10):1 108-1 117. |