메뉴 건너뛰기




Volumn 3570, Issue , 2005, Pages 225-239

A user-friendly approach to human authentication of messages

Author keywords

Authentication; Human Cryptography

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SYSTEMS;

EID: 26444518749     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11507840_21     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 1
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • Advances in Cryptology - Eurocrypt 2003. Springer-Verlag
    • von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Advances in Cryptology - Eurocrypt 2003. Volume 2656 of Lecture Notes in Computer Science., Springer-Verlag (2003)
    • (2003) Lecture Notes in Computer Science , vol.2656
    • Von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981) 84-88
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 5
    • 84955564864 scopus 로고    scopus 로고
    • Modulation and information hiding in images
    • Isaac Newton Institute, University of Cambridge, UK
    • Smith, J.R., Comiskey, B.O.: Modulation and information hiding in images. In: Workshop on Information Hiding. Volume 1174., Isaac Newton Institute, University of Cambridge, UK (1996) 207-226
    • (1996) Workshop on Information Hiding , vol.1174 , pp. 207-226
    • Smith, J.R.1    Comiskey, B.O.2
  • 6
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Second Workshop on Information Hiding. Portland, Oregon, USA
    • Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Second Workshop on Information Hiding. Volume 1525 of Lecture Notes in Computer Science., Portland, Oregon, USA (1998) 273-289
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 8
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - Asiacrypt 2001. Springer-Verlag
    • Hopper, N.J., Blum, M.: Secure human identification protocols. In: Advances in Cryptology - Asiacrypt 2001. Volume 2248 of Lecture Notes in Computer Science., Springer-Verlag (2001) 52-66
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 9
    • 84958648410 scopus 로고    scopus 로고
    • Visual authentication and identification
    • Advances in Cryptology - Crypto'97. Springer-Verlag
    • Naor, M., Pinkas, B.: Visual authentication and identification. In: Advances in Cryptology - Crypto'97. Volume 1294 of Lecture Notes in Computer Science., Springer-Verlag (1997) 322-336
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 322-336
    • Naor, M.1    Pinkas, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.