-
1
-
-
35248831179
-
CAPTCHA: using hard AI problems for security
-
EUROCRYPT, Springer
-
Ahn L.V., Blum M., Hopper N.J., and Langford J. CAPTCHA: using hard AI problems for security. EUROCRYPT. Lecture notes in computer science vol. 2656 (2003), Springer
-
(2003)
Lecture notes in computer science
, vol.2656
-
-
Ahn, L.V.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
2
-
-
2942728016
-
Telling humans and computers apart automatically
-
Ahn L.V., Blum M., and Langford J. Telling humans and computers apart automatically. Commun. ACM 47 2 (2004) 56-60
-
(2004)
Commun. ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Ahn, L.V.1
Blum, M.2
Langford, J.3
-
4
-
-
63049110500
-
Complex image recognition and web security
-
Springer-Verlag London Ltd
-
Baird H.S. Complex image recognition and web security. Data complexity in pattern recognition (2006), Springer-Verlag London Ltd
-
(2006)
Data complexity in pattern recognition
-
-
Baird, H.S.1
-
6
-
-
39149136203
-
Avoiding massive automated voting in internet polls
-
STM2007 Elsevier
-
Basso A., and Miraglia M. Avoiding massive automated voting in internet polls. STM2007. Electron. Notes Theor. Comput. Sci. vol. 197 2 (2008) Elsevier
-
(2008)
Electron. Notes Theor. Comput. Sci.
, vol.197
, Issue.2
-
-
Basso, A.1
Miraglia, M.2
-
7
-
-
0022808786
-
A computational approach to edge detection
-
Canny J. A computational approach to edge detection. IEEE Trans. Pattern Anal. Mach. Intell. 8 6 (1986) 679-698
-
(1986)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.8
, Issue.6
, pp. 679-698
-
-
Canny, J.1
-
9
-
-
25144445239
-
Building segmentation based human-friendly human interaction proofs (HIPs)
-
HIP. Baird H.S., and Lopresti D.P. (Eds), Springer
-
Chellapilla K., Larson K., Simard P.Y., and Czerwinski M. Building segmentation based human-friendly human interaction proofs (HIPs). In: Baird H.S., and Lopresti D.P. (Eds). HIP. Lecture notes in computer science vol. 3517 (2005), Springer
-
(2005)
Lecture notes in computer science
, vol.3517
-
-
Chellapilla, K.1
Larson, K.2
Simard, P.Y.3
Czerwinski, M.4
-
11
-
-
0038056097
-
Baffletext: a human interactive proof
-
SPIE, Santa Clara, CA, USA
-
Chew M., and Baird H.S. Baffletext: a human interactive proof. Proceedings of the SPIE/IS&T document recognition and retrieval X conference vol. 4670 (2003), SPIE, Santa Clara, CA, USA
-
(2003)
Proceedings of the SPIE/IS&T document recognition and retrieval X conference
, vol.4670
-
-
Chew, M.1
Baird, H.S.2
-
14
-
-
78650006229
-
Imagination: a robust image-based captcha generation system
-
ACM Press, New York, NY, USA
-
Datta R., Li J., and Wang J.Z. Imagination: a robust image-based captcha generation system. Proceedings of the 13th annual ACM international conference on Multimedia (MULTIMEDIA '05) (2005), ACM Press, New York, NY, USA
-
(2005)
Proceedings of the 13th annual ACM international conference on Multimedia (MULTIMEDIA '05)
-
-
Datta, R.1
Li, J.2
Wang, J.Z.3
-
19
-
-
70349284581
-
Secure human identification protocols
-
ASIACRYPT, Springer
-
Hopper N.J., and Blum M. Secure human identification protocols. ASIACRYPT. Lecture notes in computer science vol. 224 (2001), Springer
-
(2001)
Lecture notes in computer science
, vol.224
-
-
Hopper, N.J.1
Blum, M.2
-
20
-
-
84924375780
-
Botz-4-sale: surviving organized ddos attacks that mimic flash crowds
-
Kandula S., Katabi D., Jacob M., and Berger A.W. Botz-4-sale: surviving organized ddos attacks that mimic flash crowds. Second symposium on Networked Systems Design and Implementation (NSDI), Boston, MA (2005)
-
(2005)
Second symposium on Networked Systems Design and Implementation (NSDI), Boston, MA
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.W.4
-
21
-
-
63049096755
-
-
KittenAuth (2007). http://www.thepcspy.com/kittenauth
-
(2007)
KittenAuth
-
-
-
24
-
-
33745130042
-
Content-based multimedia information retrieval: state of the art and challenges
-
Lew M.S., Sebe N., Djeraba C., and Jain R. Content-based multimedia information retrieval: state of the art and challenges. ACM Trans. Multimedia Comput. Commun. Appl. 2 1 (2006) 1-19
-
(2006)
ACM Trans. Multimedia Comput. Commun. Appl.
, vol.2
, Issue.1
, pp. 1-19
-
-
Lew, M.S.1
Sebe, N.2
Djeraba, C.3
Jain, R.4
-
26
-
-
39149098302
-
Inaccessibility of CAPTCHA: alternatives to visual Turing tests on the web
-
May M. Inaccessibility of CAPTCHA: alternatives to visual Turing tests on the web. W3C working group note (November 2005). http://www.w3.org/TR/turingtest/
-
(2005)
W3C working group note
-
-
May, M.1
-
27
-
-
63049114980
-
-
Microsoft Asirra (2007). http://research.microsoft.com/asirra/
-
(2007)
Microsoft Asirra
-
-
-
29
-
-
18744376590
-
Using graphic Turing tests to counter automated ddos attacks against web servers
-
Morein W., Stavrou A., Cook D., Keromytis A., Misra V., and Rubenstein D. Using graphic Turing tests to counter automated ddos attacks against web servers. Proceedings of the 10th ACM international conference on Computer and Communications Security (CCS), Washington D.C. (2003)
-
(2003)
Proceedings of the 10th ACM international conference on Computer and Communications Security (CCS), Washington D.C.
-
-
Morein, W.1
Stavrou, A.2
Cook, D.3
Keromytis, A.4
Misra, V.5
Rubenstein, D.6
-
36
-
-
0038687701
-
Securing passwords against dictionary attacks
-
ACM Press, New York, NY, USA
-
Pinkas B., and Sander T. Securing passwords against dictionary attacks. CCS '02: proceedings of the 9th ACM conference on computer and communications security (2002), ACM Press, New York, NY, USA
-
(2002)
CCS '02: proceedings of the 9th ACM conference on computer and communications security
-
-
Pinkas, B.1
Sander, T.2
-
37
-
-
63049111048
-
-
Department of Computer Science, Carnegie Mellon University
-
reCAPTCHA: stop spam, read books (2007), Department of Computer Science, Carnegie Mellon University. http://www.recaptcha.net/
-
(2007)
reCAPTCHA: stop spam, read books
-
-
-
39
-
-
0002988210
-
Computing machinery and intelligence
-
Turing A.M. Computing machinery and intelligence. Mind LIX (59) 236 (1950) 433-460
-
(1950)
Mind
, vol.LIX 59
, Issue.236
, pp. 433-460
-
-
Turing, A.M.1
-
40
-
-
0039136292
-
Internet vulnerabilities related to tcp/ip and t/tcp
-
Vivo M.D., Vivo G.O.D., Koeneke R., and Isern G. Internet vulnerabilities related to tcp/ip and t/tcp. SIGCOMM Comput. Commun. Rev. 29 1 (1999) 81-85
-
(1999)
SIGCOMM Comput. Commun. Rev.
, vol.29
, Issue.1
, pp. 81-85
-
-
Vivo, M.D.1
Vivo, G.O.D.2
Koeneke, R.3
Isern, G.4
-
41
-
-
63049123941
-
-
Yahoo! CAPTCHA is broken (2008). http://network-security-research.blogspot.com/2008/01/yahoo-captcha-is- broken.html
-
(2008)
Yahoo! CAPTCHA is broken
-
-
|