Login / Signup
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
Haritabh Gupta
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
Published in:
J. Comput. Secur. (2018)
Keyphrases
</>
countermeasures
power analysis
secret key
block cipher
neural network
database
mobile devices
augmented reality
information security
artificial intelligence
video camera
authentication protocol
secure communication
attack graph