{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T21:10:10Z","timestamp":1756156210476,"version":"3.44.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/csnet47905.2019.9108962","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:03:11Z","timestamp":1591376591000},"page":"130-137","source":"Crossref","is-referenced-by-count":2,"title":["Verification of Keyboard Acoustics Authentication on Laptops and Smartphones Using WebRTC"],"prefix":"10.1109","author":[{"given":"Christian","family":"Tietz","sequence":"first","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]},{"given":"Eric","family":"Klieme","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]},{"given":"Lukas","family":"Behrendt","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]},{"given":"Pawel","family":"B\u00f6ning","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]},{"given":"Leonard","family":"Marschke","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[{"name":"University of Potsdam,Hasso Plattner Institute,Germany"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2017.8167859"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_27"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2374424"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80036-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.13176\/11.427"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/3477.558812"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.02.004"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2007.4371256"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/581271.581272"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72849-8_41"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RADIOELEK.2016.7477360"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.15598\/aeee.v13i4.1466"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-064-8_1"},{"key":"ref6","first-page":"45","article-title":"Itsme: Multi-modal and unobtrusive behavioural user authentication for smart-phones","author":"buriro","year":"2015","journal-title":"International Conference on Passwords"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4571-7"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00096"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2984393.2984403"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30436-1_38"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950480"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ypmed.2013.04.004"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1117\/12.847886"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013592"},{"article-title":"Cracking passwords using keyboard acoustics and language modeling","year":"2010","author":"kelly","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/3468.661150"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609959"},{"key":"ref23","first-page":"3","article-title":"Keyboard acoustic emanations","author":"asonov","year":"2004","journal-title":"null"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICB.2013.6613015"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1145\/3052973.3053005","article-title":"Don&#x2019;t skype & type!: Acoustic eavesdropping in voice-over-ip","author":"compagno","year":"2017","journal-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"}],"event":{"name":"2019 3rd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2019,10,23]]},"location":"Quito, Ecuador","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 3rd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9106988\/9108844\/09108962.pdf?arnumber=9108962","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:41:29Z","timestamp":1756154489000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108962\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csnet47905.2019.9108962","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}