![Input/output / Computer keyboard / Speech recognition / Typing / Cepstrum / Linear classifier / Password / Function key / Computer security compromised by hardware failure / Human–computer interaction / Computing / Statistics Input/output / Computer keyboard / Speech recognition / Typing / Cepstrum / Linear classifier / Password / Function key / Computer security compromised by hardware failure / Human–computer interaction / Computing / Statistics](https://www.pdfsearch.io/img/ae81f76e33b39c91854f85de5ef44f50.jpg) Date: 2009-09-11 13:19:34Input/output Computer keyboard Speech recognition Typing Cepstrum Linear classifier Password Function key Computer security compromised by hardware failure Human–computer interaction Computing Statistics | | To appear in the ACM Transactions on Information and Systems Security Keyboard Acoustic Emanations Revisited Li Zhuang, Feng Zhou, J. D. Tygar University of California, Berkeley {zl,zf,tygar}@cs.berkeley.eduAdd to Reading ListSource URL: www.cs.berkeley.eduDownload Document from Source Website File Size: 549,57 KBShare Document on Facebook
|