메뉴 건너뛰기




Volumn , Issue , 2006, Pages 471-474

Visual CAPTCHAs for document authentication

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER HARDWARE; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE ANALYSIS;

EID: 34250781585     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MMSP.2006.285353     Document Type: Conference Paper
Times cited : (18)

References (10)
  • 1
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, February 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 2
    • 84861909958 scopus 로고    scopus 로고
    • TCG Best Practices Committee, Online, Available
    • TCG Best Practices Committee, "Design, implementation, and usage principles for TPM-based platforms," 2005. [Online]. Available: https://www.trustedcomputinggroup.org/downloads/bestpractices-/ Best_Practices_Principles_Document_v1.0.pdf
    • (2005) Design, implementation, and usage principles for TPM-based platforms
  • 3
    • 34250719016 scopus 로고    scopus 로고
    • F. Chiachiarella, U. Fasting, T. Fey, S. Leppler, G. Lux, P. Lubb, A. Moser, G. Otten, J. Schlattmann, S. Schumann, L. Schweizer, and F.-J. Souren, Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft, Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV, 13, 2004. [Online]. Available: http://www.gdv- online.de/tcg/pos_tcg.pdf
    • F. Chiachiarella, U. Fasting, T. Fey, S. Leppler, G. Lux, P. Lubb, A. Moser, G. Otten, J. Schlattmann, S. Schumann, L. Schweizer, and F.-J. Souren, "Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft," Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV, vol. 13, 2004. [Online]. Available: http://www.gdv- online.de/tcg/pos_tcg.pdf
  • 5
    • 84926193517 scopus 로고
    • Visual cryptography
    • Online, Available
    • M. Naor and A. Shamir, "Visual cryptography," Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1995. [Online]. Available: citeseer.ist.psu.edu/naor95visual.html
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 1-12
    • Naor, M.1    Shamir, A.2
  • 6
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 7
    • 33746596537 scopus 로고    scopus 로고
    • Visual document authentication using human-recognizable watermarks
    • Proceedings of ETRICS 2006, Springer-Verlag, June
    • I. Fischer and T. Herfet, "Visual document authentication using human-recognizable watermarks," in Proceedings of ETRICS 2006, LNCS 3995. Springer-Verlag, June 2006, pp. 509-521.
    • (2006) LNCS , vol.3995 , pp. 509-521
    • Fischer, I.1    Herfet, T.2
  • 9
    • 35248831179 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • Online, Available
    • L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proceedings of Eurocrypt, 2003, pp. 294-311. [Online]. Available: citeseer.ist.psu.edu/vonahn03captcha.html
    • (2003) Proceedings of Eurocrypt , pp. 294-311
    • von Ahn, L.1    Blum, M.2    Hopper, N.3    Langford, J.4
  • 10
    • 0041431049 scopus 로고    scopus 로고
    • Recognizing objects in adversarial clutter - breaking a visual captcha
    • Madison, USA: IEEE Computer Society, June, Online, Available
    • G. Mori and J. Malik, "Recognizing objects in adversarial clutter - breaking a visual captcha," in Proc. Conf. Computer Vision and Pattern Recognition, vol. 1. Madison, USA: IEEE Computer Society, June 2003, pp. 134-141. [Online]. Available: citeseer.ist.psu.edu/mori03recognizing.html
    • (2003) Proc. Conf. Computer Vision and Pattern Recognition , vol.1 , pp. 134-141
    • Mori, G.1    Malik, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.