Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
Identifieur interne : 000B61 ( Main/Exploration ); précédent : 000B60; suivant : 000B62Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
Auteurs : J. Mitchell [Royaume-Uni]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2009.
Abstract
Abstract: It’s ironic that these hard problems, such as character recognition, have been known to be hard for a long, long time, and yet almost as soon as people make crypto things out of them, they get solved. Actually it’s not quite the way you think because what’s happened is that for the examples that get automatically generated, there are special techniques which work just because they’ve been created deliberately. It’s not trivial to produce things that are really hard to solve, and some of the ideas for distorting characters have been quickly broken, but I believe there are some around which are quite robust.
Url:
DOI: 10.1007/978-3-642-04904-0_23
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000D75
- to stream Istex, to step Curation: 000B35
- to stream Istex, to step Checkpoint: 000632
- to stream Main, to step Merge: 000B71
- to stream Main, to step Curation: 000B61
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries</title>
<author><name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:492AEC393B80D1F3C96F40C76A287A7650F61EA3</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-04904-0_23</idno>
<idno type="url">https://api.istex.fr/document/492AEC393B80D1F3C96F40C76A287A7650F61EA3/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000D75</idno>
<idno type="wicri:Area/Istex/Curation">000B35</idno>
<idno type="wicri:Area/Istex/Checkpoint">000632</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Mitchell J:using:human:interactive</idno>
<idno type="wicri:Area/Main/Merge">000B71</idno>
<idno type="wicri:Area/Main/Curation">000B61</idno>
<idno type="wicri:Area/Main/Exploration">000B61</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries</title>
<author><name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
<affiliation wicri:level="4"><country>Royaume-Uni</country>
<placeName><settlement type="city">Londres</settlement>
<region type="country">Angleterre</region>
<region type="région" nuts="1">Grand Londres</region>
</placeName>
<orgName type="university">Université de Londres</orgName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
</series>
<idno type="istex">492AEC393B80D1F3C96F40C76A287A7650F61EA3</idno>
<idno type="DOI">10.1007/978-3-642-04904-0_23</idno>
<idno type="ChapterID">Chap23</idno>
<idno type="ChapterID">23</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: It’s ironic that these hard problems, such as character recognition, have been known to be hard for a long, long time, and yet almost as soon as people make crypto things out of them, they get solved. Actually it’s not quite the way you think because what’s happened is that for the examples that get automatically generated, there are special techniques which work just because they’ve been created deliberately. It’s not trivial to produce things that are really hard to solve, and some of the ideas for distorting characters have been quickly broken, but I believe there are some around which are quite robust.</div>
</front>
</TEI>
<affiliations><list><country><li>Royaume-Uni</li>
</country>
<region><li>Angleterre</li>
<li>Grand Londres</li>
</region>
<settlement><li>Londres</li>
</settlement>
<orgName><li>Université de Londres</li>
</orgName>
</list>
<tree><country name="Royaume-Uni"><region name="Angleterre"><name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
</region>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/MozartV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000B61 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000B61 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Musique |area= MozartV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:492AEC393B80D1F3C96F40C76A287A7650F61EA3 |texte= Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries }}
This area was generated with Dilib version V0.6.20. |