Introduction to a special session on EMC and information security

Yu Ichi Hayashi, Jong Gwan Yook

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

This paper introduces the special section on EMC and Information Security. As information security becomes more important every day, safeguarding security at the physical level is as important as at the higher levels. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and storage capacity has increased. With these changes, the threat has increased of advanced attacks that were previously too difficult to carry out, not just in the military and diplomatic fields but also for general-use commercial manufactured goods. This special session focuses on the problem of reduced security concerning electromagnetic waves (electromagnetic information security), which has made attack detection particularly difficult at the physical level. As well as introducing the mechanisms of these information leaks and countermeasures, this session presents the latest research trends.

Original languageEnglish
Title of host publication2016 URSI Asia-Pacific Radio Science Conference, URSI AP-RASC 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1275-1276
Number of pages2
ISBN (Electronic)9781467388016
DOIs
Publication statusPublished - 2016 Oct 19
Event2016 URSI Asia-Pacific Radio Science Conference, URSI AP-RASC 2016 - Seoul, Korea, Republic of
Duration: 2016 Aug 212016 Aug 25

Publication series

Name2016 URSI Asia-Pacific Radio Science Conference, URSI AP-RASC 2016

Other

Other2016 URSI Asia-Pacific Radio Science Conference, URSI AP-RASC 2016
Country/TerritoryKorea, Republic of
CitySeoul
Period16/8/2116/8/25

Bibliographical note

Publisher Copyright:
© 2016 IEEE.

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Instrumentation
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Introduction to a special session on EMC and information security'. Together they form a unique fingerprint.

Cite this