Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Valerica Bindar"'
Publikováno v:
Wireless Personal Communications. 126:97-122
Universal Serial Bus (USB) has become the dominant Plug & Play interface for personal computers and continues to grow. Any digital communication source emits secondary or unwanted emissions, called compromising emanations, as they can be received and
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030239756
FABULOUS
FABULOUS
In this paper a simple test-bed to evaluate the effect of an unmodulated disrupting signal on a TETRA π/4-DQPSK (Differential Quadrature Phase-Shift Keying) signal has been developed and implemented, such that the transmitted signal does not affect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::53c16cce6a6081c9189a8c99349659cd
https://doi.org/10.1007/978-3-030-23976-3_23
https://doi.org/10.1007/978-3-030-23976-3_23
Publikováno v:
Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies IX.
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319922126
FABULOUS
FABULOUS
In this paper we propose a method of detecting the propagation frequencies of compromising emanations in order to evaluate the risk of eavesdropping the display units. By modulating the video signal with an audio file, we have been able to detect the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1c868b47e73a7405c94d5d8608b884b8
https://doi.org/10.1007/978-3-319-92213-3_7
https://doi.org/10.1007/978-3-319-92213-3_7
Publikováno v:
2016 International Conference on Communications (COMM).
TEMPEST procedures are a series of protection measures that are used to protect the IT infrastructure against electromagnetic eavesdropping. This paper presents the main characteristics and applications of the TEMPEST procedures and a number of real
Publikováno v:
2016 International Conference on Communications (COMM).
The purpose of this article is to analyze two cases of interference signals that were superposed in spectrum over the satellite communication between a base station and a remote terminal. In the first case, a wideband modulated radio frequency distur
Publikováno v:
2015 International Symposium on Signals, Circuits and Systems (ISSCS).
In this paper, a comparison between different propagation models is presented, base, at first, on Matlab simulation and, then, on a simulation performed in ICS Telecom, a software specialized in radio planning. Based on the simulation results, a TETR
Publikováno v:
Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies VII.
The objective of this study is to provide an overview of basic technical elements and security risks of RFID communication systems and to analyze the possible threats arising from the use of RFID systems. A number of measurements are performed on a c
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319270715
FABULOUS
FABULOUS
The main purpose of the research conducted in this field is to improve senior’s Quality of Life using remote monitoring systems. One of the main problems of these remote systems is the sensitive personal/medical data security. As in different field
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b18271c8eebe390d3c2f2714fdadd533
https://doi.org/10.1007/978-3-319-27072-2_11
https://doi.org/10.1007/978-3-319-27072-2_11
Publikováno v:
2014 10th International Conference on Communications (COMM).
In order to ensure that a shielded enclosure is adequate for its intended purpose, it is important that the enclosure is correctly evaluated using a certified testing procedure. During the execution of the enclosure, two tests are recommended. The pr