메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 547-552

Mandatory human participation: A new authentication scheme for building secure systems

Author keywords

Application software; Authentication; Character recognition; Computer crime; Computer security; Cryptographic protocols; Humans; Optical character recognition software; Optical computing; Robustness

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; CHARACTER RECOGNITION; COMPUTER CRIME; COMPUTER NETWORKS; CRYPTOGRAPHY; DENIAL-OF-SERVICE ATTACK; OPTICAL CHARACTER RECOGNITION; OPTICAL DATA PROCESSING; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; SECURITY SYSTEMS; SEMANTICS;

EID: 84932087266     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2003.1284222     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 0002988210 scopus 로고
    • Computing machinery and intelligence
    • A. Turing, "Computing machinery and intelligence," Mind, pp. 433-460, 1950.
    • (1950) Mind , pp. 433-460
    • Turing, A.1
  • 4
    • 0002738343 scopus 로고
    • Security problems in the TCP/IP protocol suite
    • S. Bellovin, "Security problems in the tcp/ip protocol suite," ACM Computer Communication Review, vol. 19, no. 2, 1990.
    • (1990) ACM Computer Communication Review , vol.19 , Issue.2
    • Bellovin, S.1
  • 6
    • 0039885049 scopus 로고    scopus 로고
    • Optical character recognition (ocr) as a digitization technology
    • S. Haigh, "Optical character recognition (ocr) as a digitization technology," Network Notes 37, 1996.
    • (1996) Network Notes , vol.37
    • Haigh, S.1
  • 7
    • 84911264381 scopus 로고
    • High-performance reading machines
    • July
    • S. Srihari, "High-performance reading machines," Proceedings of the IEEE, vol. 80, no. 7, pp. 1120-1132, July 1992.
    • (1992) Proceedings of the IEEE , vol.80 , Issue.7 , pp. 1120-1132
    • Srihari, S.1
  • 9
    • 2342665173 scopus 로고    scopus 로고
    • Hello, are you human
    • Georgia Institute of Technology, Tech. Rep., Nov.
    • J. Xu, R. Lipton, and I. Essa, "Hello, are you human," Technical Report GIT-CC-00-28, Georgia Institute of Technology, Tech. Rep., Nov. 2000.
    • (2000) Technical Report GIT-CC-00-28
    • Xu, J.1    Lipton, R.2    Essa, I.3
  • 11
    • 0003729341 scopus 로고    scopus 로고
    • RFC2104: HMAC: Keyed-hashing for message authentication
    • Network Working Group, Feb.
    • H. Krawczyk, M. Bellare, and R. Canetti, RFC2104: HMAC: Keyed-Hashing for Message Authentication, RFC 2104, Network Working Group, Feb. 1997.
    • (1997) RFC 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 12
    • 51549120471 scopus 로고
    • Building fast macs from hash functions
    • Springer-Verlag
    • B. Preneel and P. Oorschot, "Building fast macs from hash functions," in Proceedings of Crypto'95. Springer-Verlag, 1995, pp. 1-14.
    • (1995) Proceedings of Crypto'95 , pp. 1-14
    • Preneel, B.1    Oorschot, P.2
  • 15
    • 0038482881 scopus 로고    scopus 로고
    • Carnegie Mellon University
    • "The captcha project," Carnegie Mellon University, http://www.captcha.net.
    • The Captcha Project
  • 16
    • 84861587712 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • Mar.
    • A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in Proc. of NDSS'99. Internet Society, Mar. 1999.
    • (1999) Proc. of NDSS'99. Internet Society
    • Juels, A.1    Brainard, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.