Securing passwords against dictionary attacks
Proceedings of the 9th ACM conference on Computer and communications security
Pessimal Print: A Reverse Turing Test
ICDAR '01 Proceedings of the Sixth International Conference on Document Analysis and Recognition
Recognizing objects in adversarial clutter: breaking a visual captcha
CVPR'03 Proceedings of the 2003 IEEE computer society conference on Computer vision and pattern recognition
Using Character Recognition and Segmentation to Tell Computer from Humans
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
Designing human friendly human interaction proofs (HIPs)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secure distributed human computation
Proceedings of the 6th ACM conference on Electronic commerce
Preventing bots from playing online games
Computers in Entertainment (CIE) - Theoretical and Practical Computer Applications in Entertainment
Practical application of visual illusions: errare humanum est
APGV '05 Proceedings of the 2nd symposium on Applied perception in graphics and visualization
IMAGINATION: a robust image-based CAPTCHA generation system
Proceedings of the 13th annual ACM international conference on Multimedia
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Developing usable CAPTCHAs for blind users
Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
Detecting splogs via temporal dynamics using self-similarity analysis
ACM Transactions on the Web (TWEB)
Avoiding Massive Automated Voting in Internet Polls
Electronic Notes in Theoretical Computer Science (ENTCS)
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Usability of CAPTCHAs or usability issues in CAPTCHA design
Proceedings of the 4th symposium on Usable privacy and security
Phishwish: A Stateless Phishing Filter Using Minimal Rules
Financial Cryptography and Data Security
Identity Theft: Much Too Easy? A Study of Online Systems in Norway
Financial Cryptography and Data Security
Kwyjibo: automatic domain name generation
Software—Practice & Experience
A low-cost attack on a Microsoft captcha
Proceedings of the 15th ACM conference on Computer and communications security
POSH: a generalized captcha with security applications
Proceedings of the 1st ACM workshop on Workshop on AISec
Online multi-label active annotation: towards large-scale content-based video search
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A CAPTCHA system for Nintendo DS
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Evaluating existing audio CAPTCHAs and an interface optimized for non-visual use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Think-an image based CAPTCHA mechanism (testifying human based on intelligence and knowledge)
Proceedings of the International Conference on Advances in Computing, Communication and Control
Balancing usability and security in a video CAPTCHA
Proceedings of the 5th Symposium on Usable Privacy and Security
TagCaptcha: annotating images with CAPTCHAs
Proceedings of the ACM SIGKDD Workshop on Human Computation
The interrogator as critic: The turing test and the evaluation of generative music systems
Computer Music Journal
ACM SIGGRAPH Asia 2009 papers
Optimal false-name-proof voting rules with costly voting
AAAI'08 Proceedings of the 23rd national conference on Artificial intelligence - Volume 1
Exploiting the human-machine gap in image recognition for designing CAPTCHAs
IEEE Transactions on Information Forensics and Security
On cellular botnets: measuring the impact of malicious devices on a cellular network core
Proceedings of the 16th ACM conference on Computer and communications security
Streamlining attacks on CAPTCHAs with a computer game
IJCAI'09 Proceedings of the 21st international jont conference on Artifical intelligence
An automated reverse turing test using facial expressions
HSI'09 Proceedings of the 2nd conference on Human System Interactions
ACM Transactions on Computer Systems (TOCS)
The robustness of a new CAPTCHA
Proceedings of the Third European Workshop on System Security
Scene tagging: image-based CAPTCHA using image composition and object relationships
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Sketcha: a captcha based on line drawings of 3D models
Proceedings of the 19th international conference on World wide web
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
Proceedings of the 2010 ACM Symposium on Applied Computing
Advanced technology training for operating the microlithography panel printer
ICDHM'07 Proceedings of the 1st international conference on Digital human modeling
Towards A Universally Usable Human Interaction Proof: Evaluation of Task Completion Strategies
ACM Transactions on Accessible Computing (TACCESS)
Modeling human behavior for defense against flash-crowd attacks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
On the effectiveness of IP reputation for spam filtering
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Password strength: an empirical analysis
INFOCOM'10 Proceedings of the 29th conference on Information communications
Efficient receipt-free ballot casting resistant to covert channels
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Impeding CAPTCHA breakers with visual decryption
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Leveraging cognitive factors in securing WWW with CAPTCHA
WebApps'10 Proceedings of the 2010 USENIX conference on Web application development
Attacks and design of image recognition CAPTCHAs
Proceedings of the 17th ACM conference on Computer and communications security
Crowdsourcing human-based computation
Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries
Measuring universal intelligence: Towards an anytime intelligence test
Artificial Intelligence
Towards inclusive identity management
Identity in the Information Society
Proceedings of the 16th Conference on Pattern Languages of Programs
A study of CAPTCHA and its application to user authentication
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
CAPTCHA phishing: a practical attack on human interaction proofing
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
On the necessity of user-friendly CAPTCHA
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Challenges of CAPTCHA in the accessibility of Indian regional websites
COMPUTE '11 Proceedings of the Fourth Annual ACM Bangalore Conference
Web Wisdom: An essay on how Web 2.0 and Semantic Web can foster a global knowledge society
Computers in Human Behavior
Using mobile phones to write in air
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Comparing humans and AI agents
AGI'11 Proceedings of the 4th international conference on Artificial general intelligence
Reliability and effectiveness of clickthrough data for automatic image annotation
Multimedia Tools and Applications
Detecting fraudulent use of cloud resources
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Purposive hidden-object-game: embedding human computation in popular game
MM '11 Proceedings of the 19th ACM international conference on Multimedia
Purposive hidden-object game (P-HOG) towards imperceptible human computation
MM '11 Proceedings of the 19th ACM international conference on Multimedia
SEMAGE: a new image-based two-factor CAPTCHA
Proceedings of the 27th Annual Computer Security Applications Conference
Guaranteeing access in spite of distributed service-flooding attacks
Proceedings of the 11th international conference on Security Protocols
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Secure distributed human computation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Collaborative filtering CAPTCHAs
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
CAPTCHA generation as a web service
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
A multilayer overlay network architecture for enhancing IP services availability against dos
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Do cognitive styles of users affect preference and performance related to CAPTCHA challenges?
CHI '12 Extended Abstracts on Human Factors in Computing Systems
A novel architecture for the generation of picture based CAPTCHA
ADCONS'11 Proceedings of the 2011 international conference on Advanced Computing, Networking and Security
Review: Analyzing well-known countermeasures against distributed denial of service attacks
Computer Communications
Security and usability challenges of moving-object CAPTCHAs: decoding codewords in motion
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Breaking reCAPTCHAs with unpredictable collapse: heuristic character segmentation and recognition
MCPR'12 Proceedings of the 4th Mexican conference on Pattern Recognition
CAPTCHA suitable for smartphones
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
SeeSay and HearSay CAPTCHA for mobile interaction
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A survey and analysis of current CAPTCHA approaches
Journal of Web Engineering
CrowdLearner: rapidly creating mobile recognizers using crowdsourcing
Proceedings of the 26th annual ACM symposium on User interface software and technology
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
TaskGenies: Automatically Providing Action Plans Helps People Complete Tasks
ACM Transactions on Computer-Human Interaction (TOCHI)
The robustness of hollow CAPTCHAs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
UNTANGLED: A Game Environment for Discovery of Creative Mapping Strategies
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
A User-friendly Image-Text Fusion CAPTCHA for Secure Web Services
Proceedings of International Conference on Information Integration and Web-based Applications & Services
DeepCAPTCHA: an image CAPTCHA based on depth perception
Proceedings of the 5th ACM Multimedia Systems Conference
Real-time detection of application-layer DDoS attack using time series analysis
Journal of Control Science and Engineering - Special issue on Advances in Methods for Networked and Cyber-Physical System
A novel gesture-based CAPTCHA design for smart devices
BCS-HCI '13 Proceedings of the 27th International BCS Human Computer Interaction Conference
How universal can an intelligence test be?
Adaptive Behavior - Animals, Animats, Software Agents, Robots, Adaptive Systems
Hi-index | 0.00 |
How lazy cryptographers do AI.