{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:03:07Z","timestamp":1772146987098,"version":"3.50.1"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/isias.2011.6122840","type":"proceedings-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T17:01:11Z","timestamp":1326301271000},"page":"320-325","source":"Crossref","is-referenced-by-count":41,"title":["A fast eavesdropping attack against touchscreens"],"prefix":"10.1109","author":[{"given":"Federico","family":"Maggi","sequence":"first","affiliation":[]},{"given":"Simone","family":"Gasparini","sequence":"additional","affiliation":[]},{"given":"Giacomo","family":"Boracchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"1","article-title":"Spy-resistant keyboard: More secure password entry on public touch screen displays","author":"tan","year":"2005","journal-title":"OZCHI '05"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"11","author":"maggi","year":"2010","journal-title":"Don't Touch a Word! A Practical Input Eavesdropping Attack Against Mobile Touchscreen Devices"},{"key":"12","article-title":"Method and apparatus for preventing on-screen keys from being accidentally touched using the same","author":"tsuei","year":"2009"},{"key":"3","author":"semple","year":"1998","journal-title":"Algebraic Projective Geometry"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.28"},{"key":"10","first-page":"120","article-title":"Fast normalized cross-correlation","volume":"10","author":"lewis","year":"1995","journal-title":"Vision Interface"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2307\/2337118"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1400815"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811685"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"8","author":"gonzalez","year":"2006","journal-title":"Digital Image Processing (3rd Ed )"}],"event":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","location":"Melacca, Malaysia","start":{"date-parts":[[2011,12,5]]},"end":{"date-parts":[[2011,12,8]]}},"container-title":["2011 7th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6112288\/6122777\/06122840.pdf?arnumber=6122840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T11:50:16Z","timestamp":1490097016000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6122840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/isias.2011.6122840","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}