-
1
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Advances in Cryptology - Eurocrypt 2003. Springer-Verlag
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Advances in Cryptology - Eurocrypt 2003. Volume 2656 of Lecture Notes in Computer Science., Springer-Verlag (2003)
-
(2003)
Lecture Notes in Computer Science
, vol.2656
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
2
-
-
85009247912
-
A reverse turing test using speech
-
Denver, Colorado
-
Kochanski, G., Lopresti, D., Shih, C.: A reverse turing test using speech. In: Proceedings of the International Conferences on Spoken Language Processing, Denver, Colorado (2002) 1357-1360
-
(2002)
Proceedings of the International Conferences on Spoken Language Processing
, pp. 1357-1360
-
-
Kochanski, G.1
Lopresti, D.2
Shih, C.3
-
3
-
-
3042588361
-
Smart cards in hostile environments
-
Gobioff, H., Smith, S., Tygar, J.D., Yee, B.: Smart cards in hostile environments. In: Proceedings of the Second USENIX Workshop on Electronic Commerce. (1996)
-
(1996)
Proceedings of the Second USENIX Workshop on Electronic Commerce
-
-
Gobioff, H.1
Smith, S.2
Tygar, J.D.3
Yee, B.4
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84-88
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
84955564864
-
Modulation and information hiding in images
-
Isaac Newton Institute, University of Cambridge, UK
-
Smith, J.R., Comiskey, B.O.: Modulation and information hiding in images. In: Workshop on Information Hiding. Volume 1174., Isaac Newton Institute, University of Cambridge, UK (1996) 207-226
-
(1996)
Workshop on Information Hiding
, vol.1174
, pp. 207-226
-
-
Smith, J.R.1
Comiskey, B.O.2
-
6
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Second Workshop on Information Hiding. Portland, Oregon, USA
-
Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Second Workshop on Information Hiding. Volume 1525 of Lecture Notes in Computer Science., Portland, Oregon, USA (1998) 273-289
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
8
-
-
70349284581
-
Secure human identification protocols
-
Advances in Cryptology - Asiacrypt 2001. Springer-Verlag
-
Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Cryptology - Asiacrypt 2001. Volume 2248 of Lecture Notes in Computer Science., Springer-Verlag (2001) 52-66
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
9
-
-
84958648410
-
Visual authentication and identification
-
Advances in Cryptology - Crypto'97. Springer-Verlag
-
Naor, M., Pinkas, B.: Visual authentication and identification. In: Advances in Cryptology - Crypto'97. Volume 1294 of Lecture Notes in Computer Science., Springer-Verlag (1997) 322-336
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
|