Author:
Anand S. Abhishek,Shrestha Prakash,Saxena Nitesh
Publisher
Springer International Publishing
Reference19 articles.
1. Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 41–46 (1999)
2. Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)
3. Azenkot, S., Rector, K., Ladner, R., Wobbrock, J.: PassChords: secure multi-touch authentication for blind people. In: Proceedings of the ASSETS (2012)
4. Backes, M., Durmuth, M., Gerling, S., Pinkal, M., Sporleder, C.: Acoustic side-channel attacks on printers. In: Proceedings of the USENIX Security (2005)
5. Berger, Y., Wool, A., Yeredor, A.: Dictionary attacks using keyboard acoustic emanations. In: Proceedings of the CCS (2006)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Shoulder surfing experiments: A systematic literature review;Computers & Security;2020-12
2. Listen to Your Fingers;Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies;2020-09-04
3. An Offensive and Defensive Exposition of Wearable Computing;ACM Computing Surveys;2018-11-30
4. Tap-based user authentication for smartwatches;Computers & Security;2018-09
5. Survey and Systematization of Secure Device Pairing;IEEE Communications Surveys & Tutorials;2018