Serveur d'exploration sur Mozart

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries

Identifieur interne : 000B61 ( Main/Exploration ); précédent : 000B60; suivant : 000B62

Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries

Auteurs : J. Mitchell [Royaume-Uni]

Source :

RBID : ISTEX:492AEC393B80D1F3C96F40C76A287A7650F61EA3

Abstract

Abstract: It’s ironic that these hard problems, such as character recognition, have been known to be hard for a long, long time, and yet almost as soon as people make crypto things out of them, they get solved. Actually it’s not quite the way you think because what’s happened is that for the examples that get automatically generated, there are special techniques which work just because they’ve been created deliberately. It’s not trivial to produce things that are really hard to solve, and some of the ideas for distorting characters have been quickly broken, but I believe there are some around which are quite robust.

Url:
DOI: 10.1007/978-3-642-04904-0_23


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries</title>
<author>
<name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:492AEC393B80D1F3C96F40C76A287A7650F61EA3</idno>
<date when="2009" year="2009">2009</date>
<idno type="doi">10.1007/978-3-642-04904-0_23</idno>
<idno type="url">https://api.istex.fr/document/492AEC393B80D1F3C96F40C76A287A7650F61EA3/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000D75</idno>
<idno type="wicri:Area/Istex/Curation">000B35</idno>
<idno type="wicri:Area/Istex/Checkpoint">000632</idno>
<idno type="wicri:doubleKey">0302-9743:2009:Mitchell J:using:human:interactive</idno>
<idno type="wicri:Area/Main/Merge">000B71</idno>
<idno type="wicri:Area/Main/Curation">000B61</idno>
<idno type="wicri:Area/Main/Exploration">000B61</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries</title>
<author>
<name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
<affiliation wicri:level="4">
<country>Royaume-Uni</country>
<placeName>
<settlement type="city">Londres</settlement>
<region type="country">Angleterre</region>
<region type="région" nuts="1">Grand Londres</region>
</placeName>
<orgName type="university">Université de Londres</orgName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2009</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
</series>
<idno type="istex">492AEC393B80D1F3C96F40C76A287A7650F61EA3</idno>
<idno type="DOI">10.1007/978-3-642-04904-0_23</idno>
<idno type="ChapterID">Chap23</idno>
<idno type="ChapterID">23</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: It’s ironic that these hard problems, such as character recognition, have been known to be hard for a long, long time, and yet almost as soon as people make crypto things out of them, they get solved. Actually it’s not quite the way you think because what’s happened is that for the examples that get automatically generated, there are special techniques which work just because they’ve been created deliberately. It’s not trivial to produce things that are really hard to solve, and some of the ideas for distorting characters have been quickly broken, but I believe there are some around which are quite robust.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Royaume-Uni</li>
</country>
<region>
<li>Angleterre</li>
<li>Grand Londres</li>
</region>
<settlement>
<li>Londres</li>
</settlement>
<orgName>
<li>Université de Londres</li>
</orgName>
</list>
<tree>
<country name="Royaume-Uni">
<region name="Angleterre">
<name sortKey="Mitchell, J" sort="Mitchell, J" uniqKey="Mitchell J" first="J." last="Mitchell">J. Mitchell</name>
</region>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/MozartV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000B61 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000B61 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    MozartV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:492AEC393B80D1F3C96F40C76A287A7650F61EA3
   |texte=   Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries
}}

Wicri

This area was generated with Dilib version V0.6.20.
Data generation: Sun Apr 10 15:06:14 2016. Site generation: Tue Feb 7 15:40:35 2023