{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:51Z","timestamp":1740099111475,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319935621"},{"type":"electronic","value":"9783319935638"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93563-8_20","type":"book-chapter","created":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T07:30:02Z","timestamp":1529652602000},"page":"236-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function"],"prefix":"10.1007","author":[{"given":"Insu","family":"Oh","sequence":"first","affiliation":[]},{"given":"Kyungroul","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,23]]},"reference":[{"key":"20_CR1","unstructured":"Wikipedia: Computer Mouse. \nhttps:\/\/en.wikipedia.org\/wiki\/Computer_mouse"},{"issue":"1","key":"20_CR2","first-page":"25","volume":"7","author":"M Dadkhah","year":"2014","unstructured":"Dadkhah, M., Jazi, M.D.: A novel approach to deal with keyloggers. J. Comput. Sci. Technol. 7(1), 25\u201328 (2014)","journal-title":"J. Comput. Sci. Technol."},{"key":"20_CR3","unstructured":"Wikipedia: Virtual Keyboard. \nhttps:\/\/en.wikipedia.org\/wiki\/Virtual_keyboard"},{"issue":"5","key":"20_CR4","first-page":"534","volume":"8","author":"A Parekh","year":"2011","unstructured":"Parekh, A., Pawar, A., Munot, P., Mantri, P.: Secure authentication using anti-screenshot virtual keyboard. J. Comput. Sci. Issues 8(5), 534\u2013537 (2011)","journal-title":"J. Comput. Sci. Issues"},{"key":"20_CR5","unstructured":"Braschi, A., Continella, A.: Prometheus: A Web-based Platform for Analyzing Banking Trojans (2014)"},{"key":"20_CR6","unstructured":"Aditya, S., Rohit, B.: Prosecting the citadel botnet revealing the dominance of the zeus descendent (2014)"},{"key":"20_CR7","unstructured":"O\u2019Murchu, L., Gutierrez, F.P.: The evolution of the fileless clickfraud malware Poweliks (2015)"},{"key":"20_CR8","unstructured":"MSDN: GetCursorPos function. \nhttps:\/\/msdn.microsoft.com\/ko-kr\/library\/windows\/desktop\/ms648390(v=vs.85).aspx"},{"key":"20_CR9","unstructured":"MSDN: SetCursorPos function. \nhttps:\/\/msdn.microsoft.com\/ko-kr\/library\/windows\/desktop\/ms648394(v=vs.85).aspx"},{"key":"20_CR10","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/978-3-319-49106-6_37","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"H Lee","year":"2017","unstructured":"Lee, H., Lee, Y., Lee, K., Yim, K.: Security assessment on the mouse data using mouse loggers. Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 387\u2013393. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-49106-6_37"},{"key":"20_CR11","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-319-49106-6_38","volume-title":"Advances on Broad-Band Wireless Computing, Communication and Applications","author":"S Lee","year":"2017","unstructured":"Lee, S., Lee, K., Yim, K.: Security assessment of keyboard data based on Kaspersky product. Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 395\u2013400. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-49106-6_38"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Lee, K., Yim, K.: Keyboard security: a technological review. In: Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 9\u201315, June 2011","DOI":"10.1109\/IMIS.2011.148"},{"key":"20_CR13","unstructured":"Lee, K., Choi, Y., Yeuk, H., Yim, K.: Password sniff by forcing the keyboard to replay scan codes. In: Proceedings of the Joint Workshop on Information Security (JWIS), p. 9, August 2010"},{"key":"20_CR14","unstructured":"Lee, K., Bae, K., Yim, K.: Hardware approach to solving password exposure problem through keyboard sniff. In: Proceedings of the Academic Science Research, WASET, pp. 23\u201325, October 2009"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93563-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,22]],"date-time":"2018-06-22T07:42:39Z","timestamp":1529653359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93563-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319935621","9783319935638"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93563-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}