{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T01:23:50Z","timestamp":1725585830905},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_20","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"247-258","source":"Crossref","is-referenced-by-count":2,"title":["Analyzing Key-Click Patterns of PIN Input for Recognizing VoIP Users"],"prefix":"10.1007","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"40 websites offering telephone calling records and other confidential information, http:\/\/epic.org\/privacy\/iei\/attachment_a.pdf (visited at November 15, 2010)"},{"key":"20_CR2","unstructured":"e1071: Misc Functions of the Department of Statistics (e1071), TU Wien, http:\/\/cran.r-project.org\/web\/packages\/e1071\/index.html (visited at September 18, 2010)"},{"key":"20_CR3","unstructured":"randomForest: Breiman and Cutler\u2019s random forests for classification and regression, http:\/\/cran.r-project.org\/web\/packages\/randomForest\/ (visited at September 18, 2010)"},{"key":"20_CR4","unstructured":"rpart: Recursive Partitioning, http:\/\/cran.r-project.org\/web\/packages\/rpart\/ (visited at September 18, 2010)"},{"key":"20_CR5","unstructured":"TCPDump, http:\/\/www.tcpdump.org\/ (visited at July 20, 2010)"},{"key":"20_CR6","unstructured":"The R project for statistical computing, http:\/\/www.r-project.org\/ (visited at July 18, 2010)"},{"key":"20_CR7","unstructured":"X-Lite, http:\/\/www.counterpath.com\/x-lite.html (visited at July 18, 2010)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-642-15497-3_31","volume-title":"Computer Security \u2013 ESORICS 2010","author":"M. Backes","year":"2010","unstructured":"Backes, M., Doychev, G., D\u00fcrmuth, M., K\u00f6pf, B.: Speaker Recognition in Encrypted Voice Streams. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 508\u2013523. Springer, Heidelberg (2010)"},{"key":"20_CR9","volume-title":"Proceedings of ACSAC 2002","author":"R. Barbieri","year":"2002","unstructured":"Barbieri, R., Bruschi, D., Rosti, E.: Voice over ipsec: Analysis and solutions. In: Proceedings of ACSAC 2002. IEEE, Los Alamitos (2002)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP), RFC 3711 (2004)","DOI":"10.17487\/rfc3711"},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/380995.380999","volume":"2","author":"K.P. Bennett","year":"2000","unstructured":"Bennett, K.P., Campbell, C.: Support vector machines: hype or hallelujah? SIGKDD Explor. Newsl.\u00a02(2), 1\u201313 (2000)","journal-title":"SIGKDD Explor. Newsl."},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L. Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Machine Learning\u00a045, 5\u201332 (2001)","journal-title":"Machine Learning"},{"key":"20_CR13","volume-title":"Classification and Regression Trees","author":"L. Breiman","year":"1984","unstructured":"Breiman, L., Stone, C.J., Friedman, J., Olshen, R.A.: Classification and Regression Trees. Chapman & Hall\/CRC, Boca Raton (1984)"},{"key":"20_CR14","volume-title":"Proceedings of ICML 2006","author":"R. Caruana","year":"2006","unstructured":"Caruana, R., Niculescu-Mizil, A.: An empirical comparison of supervised learning algorithms. In: Proceedings of ICML 2006. ACM, New York (2006)"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cose.2006.08.008","volume":"26","author":"N. Clarke","year":"2007","unstructured":"Clarke, N., Furnell, S.: Advanced user authentication for mobile devices. Computer & Security\u00a026, 109\u2013119 (2007)","journal-title":"Computer & Security"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-006-0006-6","volume":"6","author":"N. Clarke","year":"2007","unstructured":"Clarke, N., Furnell, S.: Authenticating mobile phone users using keystroke analysis. International Journal of Information Security\u00a06, 1\u201314 (2007)","journal-title":"International Journal of Information Security"},{"key":"20_CR17","volume-title":"Proceedings of SEC 2003","author":"N. Clarke","year":"2010","unstructured":"Clarke, N., Furnell, S., Lines, B., Reynolds, P.: Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets. In: Proceedings of SEC 2003. Kluwer, Dordrecht (2010)"},{"key":"20_CR18","unstructured":"Egevang, K., Francis, P.: The IP Network Address Translator (NAT), RFC 1631 (2006)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Kent, S., Seo, K.: Security Architecture for the Internet Protocol, RFC 4301 (2005)","DOI":"10.17487\/rfc4301"},{"key":"20_CR20","unstructured":"Khan, L.A., Baig, M.S., Youssef, A.M.: Speaker Recognition from Encrypted VoIP Communications. Digital Investigationg (2009)"},{"issue":"4","key":"20_CR21","first-page":"289","volume":"24","author":"K. Kotani","year":"2005","unstructured":"Kotani, K., Horii, K.: Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics. Behaviour & IT\u00a024(4), 289\u2013302 (2005)","journal-title":"Behaviour & IT"},{"key":"20_CR22","volume-title":"Proceedings of DSN 2010","author":"R.A. Maxion","year":"2010","unstructured":"Maxion, R.A., Killourhy, K.S.: Keystroke biometrics with number-pad input. In: Proceedings of DSN 2010. IEEE, Los Alamitos (2010)"},{"issue":"5","key":"20_CR23","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.89","volume":"2","author":"A. Peacock","year":"2004","unstructured":"Peacock, A., Ke, X., Wilkerson, M.: Typing patterns: A key to user identification. IEEE Security and Privacy\u00a02(5), 40\u201347 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A transport protocol for real-time applications, RFC 3550 (2003)","DOI":"10.17487\/rfc3550"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Taylor, T.: RTP Payload for DTMF Digits, Telephony Tones, and Telephony Signals, RFC 4733 (2006)","DOI":"10.17487\/rfc4733"},{"key":"20_CR26","volume-title":"Proceedings of INFOCOM 2010","author":"H. Sengar","year":"2010","unstructured":"Sengar, H., Ren, Z., Wang, H., Wijesekera, D., Jajodia, S.: Tracking skype voip calls over the internet. In: Proceedings of INFOCOM 2010. IEEE, Los Alamitos (2010)"},{"key":"20_CR27","volume-title":"Proceedings of CCS 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer VoIP calls on the Internet. In: Proceedings of CCS 2005. ACM, New York (2005)"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","volume-title":"Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks","author":"C. Wu","year":"2008","unstructured":"Wu, C., Chen, K., Chang, Y., Lei, C.: Speaker Recognition in Encrypted Voice Streams. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol.\u00a05310. Springer, Heidelberg (2008)"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:03:33Z","timestamp":1606187013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_20","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}