{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:24:15Z","timestamp":1759091055804,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642224232"},{"type":"electronic","value":"9783642224249"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22424-9_5","type":"book-chapter","created":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T02:37:35Z","timestamp":1308537455000},"page":"75-84","source":"Crossref","is-referenced-by-count":3,"title":["Timing Attacks on PIN Input in VoIP Networks (Short Paper)"],"prefix":"10.1007","author":[{"given":"Ge","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Automated Telephone Payments. visited at 15th-Nov-2010, http:\/\/www.elmbridge.gov.uk\/online\/atp.htm"},{"key":"5_CR2","unstructured":"TCPDump. visited at 20th-July-2010, http:\/\/www.tcpdump.org\/"},{"key":"5_CR3","unstructured":"X-Lite. visited at 18th-July-2010, http:\/\/www.counterpath.com\/x-lite.html"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP). RFC 3711 (2004)","DOI":"10.17487\/rfc3711"},{"key":"5_CR5","unstructured":"Hogye, M.A., Hughes, C.T., Sarfaty, J.M., Wolf, J.D.: Analysis of the feasibility of keystroke timing attacks over ssh connections, technical report (2001)"},{"key":"5_CR6","first-page":"678","volume-title":"Proceedings of CCS 2010","author":"D. Foo Kune","year":"2010","unstructured":"Foo Kune, D., Kim, Y.: Timing attacks on pin input devices. In: Proceedings of CCS 2010, USA, pp. 678\u2013680. ACM Press, New York (2010)"},{"key":"5_CR7","first-page":"267","volume-title":"Chapter A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition","author":"L.R. Rabiner","year":"1990","unstructured":"Rabiner, L.R.: Readings in speech recognition. In: Chapter A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition, pp. 267\u2013296. Morgan Kaufmann Publishers Inc., San Francisco (1990)"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1023\/A:1011382801542","volume":"19","author":"R.J.B. Reynolds","year":"2001","unstructured":"Reynolds, R.J.B., Rix, A.W.: Quality voip: An engineering challenge. BT Technology Journal\u00a019, 23\u201332 (2001)","journal-title":"BT Technology Journal"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A transport protocol for real-time applications. RFC 3550 (2003)","DOI":"10.17487\/rfc3550"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Taylor, T.: RTP Payload for DTMF Digits, Telephony Tones, and Telephony Signals. RFC 4733 (2006)","DOI":"10.17487\/rfc4733"},{"key":"5_CR11","unstructured":"Song, D.X., Wagner, D., Tian, X.: Timing analysis of keystrokes and timing attacks on ssh. In: Proceedings of SSYM 2001. USENIX Association, Berkeley (2001)"},{"key":"5_CR12","unstructured":"International\u00a0Telecommunication Union. Technical features of push-button telephone sets. ITU-T Recommendation Q.24 (1988)"},{"key":"5_CR13","unstructured":"Zhang, K., Wang, X.: Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems. In: Proceedings of SSYM 2009, Berkeley, CA, pp. 17\u201332. USENIX Association (2009)"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22424-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,11]],"date-time":"2019-06-11T21:41:44Z","timestamp":1560289304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22424-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224232","9783642224249"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22424-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}