Author:
Balagani Kiran S.,Conti Mauro,Gasti Paolo,Georgiev Martin,Gurtler Tristan,Lain Daniele,Miller Charissa,Molas Kendall,Samarin Nikita,Saraci Eugen,Tsudik Gene,Wu Lynn
Publisher
Springer International Publishing
Reference32 articles.
1. Rockyou password leak (2010). http://downloads.skullsecurity.org/passwords/rockyou.txt.bz2
2. Linkedin password leak (2016). https://hashes.org/leaks.php
3. Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: IEEE S&P (2004)
4. Balzarotti, D., Cova, M., Vigna, G.: ClearShot: eavesdropping on keyboard input from video. In: IEEE S&P (2008)
5. Banerjee, R., Feng, S., Kang, J.S., Choi, Y.: Keystroke patterns as prosody in digital writings: a case study with deceptive reviews and essays. In: EMNLP. Association for Computational Linguistics (2014)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献