{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:18:02Z","timestamp":1749010682928,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319414829"},{"type":"electronic","value":"9783319414836"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41483-6_1","type":"book-chapter","created":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T11:09:11Z","timestamp":1467371351000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Deciphering Text from Touchscreen Key Taps"],"prefix":"10.1007","author":[{"given":"Haritabh","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Shamik","family":"Sural","sequence":"additional","affiliation":[]},{"given":"Vijayalakshmi","family":"Atluri","sequence":"additional","affiliation":[]},{"given":"Jaideep","family":"Vaidya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,2]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Asonov, D., Agrawal, R.: Keyboard acoustic emanations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 3\u201311 (2004)","DOI":"10.1109\/SECPRI.2004.1301311"},{"issue":"5","key":"1_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/TSA.2004.833008","volume":"12","author":"J Benesty","year":"2004","unstructured":"Benesty, J., Chen, J., Huang, Y.: Time-delay estimation via linear interpolation and cross correlation. IEEE Trans. Speech Audio Process. 12(5), 509\u2013519 (2004)","journal-title":"IEEE Trans. Speech Audio Process."},{"key":"1_CR3","unstructured":"Bochkarev, V.V., Shevlyakova, A.V., Solovyev, V.D.: Average word length dynamics as indicator of cultural changes in society. arXiv preprint (2012). arXiv:1208.6109"},{"issue":"4","key":"1_CR4","first-page":"467","volume":"18","author":"PF Brown","year":"1992","unstructured":"Brown, P.F., Desouza, P.V., Mercer, R.L., Pietra, V.J.D., Lai, J.C.: Class-based n-gram models of natural language. Comput. Linguist. 18(4), 467\u2013479 (1992)","journal-title":"Comput. Linguist."},{"issue":"4","key":"1_CR5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MPRV.2004.21","volume":"3","author":"D. Dagon","year":"2004","unstructured":"Dagon, D., Martin, T., Starner, T.: Mobile phones as computing devices: the viruses are coming! Pervasive Comput. 3(4), 11\u201315 (2004)","journal-title":"IEEE Pervasive Computing"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/TIFS.2013.2247758","volume":"8","author":"T Halevi","year":"2013","unstructured":"Halevi, T., Saxena, N.: Acoustic eavesdropping attacks on constrained wireless device pairing. IEEE Trans. Inf. Forensics Secur. 8(3), 563\u2013577 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pmcj.2015.12.001","volume":"25","author":"M Hussain","year":"2015","unstructured":"Hussain, M., Al-Haiqi, A., Zaidan, A., Zaidan, B., Kiah, M.M., Anuar, N.B., Abdulnabi, M.: The rise of keyloggers on smartphones: a survey and insight into motion-based tap inference attacks. Pervasive Mob. Comput. 25, 1\u201325 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Liu, X., Zhou, Z., Diao, W., Li, Z., Zhang, K.: When good becomes evil: keystroke inference with smartwatch. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1273\u20131285. ACM (2015)","DOI":"10.1145\/2810103.2813668"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Meng, W., Lee, W.H., Murali, S., Krishnan, S.: Charging me and i know your secrets!: towards juice filming attacks on smartphones. In: Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, pp. 89\u201398 (2015)","DOI":"10.1145\/2732198.2732205"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Miluzzo, E., Varshavsky, A., Balakrishnan, S., Choudhury, R.R.: Tapprints: your finger taps have fingerprints. In: Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323\u2013336 (2012)","DOI":"10.1145\/2307636.2307666"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Ping, D., Sun, X., Mao, B.: Textlogger: inferring longer inputs on touch screen using motion sensors. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 1\u201312. ACM (2015)","DOI":"10.1145\/2766498.2766511"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Zhu, T., Ma, Q., Zhang, S., Liu, Y.: Context-free attacks using keyboard acoustic emanations. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 453\u2013464 (2014)","DOI":"10.1145\/2660267.2660296"},{"key":"1_CR13","unstructured":"Zhu, Z., Bernhard, D., Gurevych, I.: A monolingual tree-based translation model for sentence simplification. In: Proceedings of the 23rd International Conference on Computational Linguistics, pp. 1353\u20131361 (2010)"},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1609956.1609959","volume":"13","author":"L Zhuang","year":"2009","unstructured":"Zhuang, L., Zhou, F., Tygar, J.D.: Keyboard acoustic emanations revisited. ACM Trans. Inf. Syst. Secur. 13(1), 1\u201326 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41483-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T23:33:09Z","timestamp":1748993589000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41483-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319414829","9783319414836"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41483-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}