Zhang et al., 2019 - Google Patents
Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheatingZhang et al., 2019
View PDF- Document ID
- 15636198393789335344
- Author
- Zhang J
- Hei X
- Wang Z
- Publication year
- Publication venue
- arXiv preprint arXiv:1904.12542
External Links
Snippet
Crowdsourcing human-solving or online typing attacks are destructive problems. However, studies into these topics have been limited. In this paper, we focus on this kind of attacks whereby all the CAPTCHAs can be simply broken because of its design purpose. After …
- 241000282414 Homo sapiens 0 title abstract description 41
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zhu et al. | Captcha as graphical passwords—A new security primitive based on hard AI problems | |
| Roy et al. | Generating phishing attacks using ChatGPT | |
| Begou et al. | Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt | |
| Chiasson et al. | Graphical password authentication using cued click points | |
| Lashkari et al. | Shoulder surfing attack in graphical password authentication | |
| Banday et al. | A study of CAPTCHAs for securing web services | |
| Gabor et al. | Security issues related to e-learning education | |
| Suru et al. | Security and user interface usability of graphical authentication systems–A review | |
| Kolekar et al. | Click and session based—Captcha as graphical password authentication schemes for smart phone and web | |
| Kumar et al. | Gamification of internet security by next generation CAPTCHAs | |
| Zhang et al. | Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating | |
| Payal et al. | AJIGJAX: A hybrid image based model for Captcha/CaRP | |
| Kulkarni et al. | The graphical security system by using CaRP | |
| Bindu | Click based Graphical CAPTCHA to thwart spyware attack | |
| Wang | Mitigating phishing threats | |
| Norberg et al. | BOT management trough CAPTCHA: A study of which factors that make for the most usable, effective and unobtrusive CAPTCHA implementations | |
| Ghosh | AdaptAuth: Multi-Layered Behavioral and Credential Analysis for a Secure and Adaptive Authentication Framework for Password Security | |
| Jonsson et al. | Multi-factor authentication mechanism based on browser fingerprinting and graphical honeytokens | |
| Gunaseeli et al. | Graphical passwords implies on tolerance password, image choice, and puzzle login security | |
| Ananya | ADDING A TIMER TO CAPTCHA-BASED RGB COLOR AUTHENTICATION | |
| Tayade et al. | An Enhanced Authentication System using Multi-Level Security for web Services | |
| Hart et al. | Phorcefield: A phish-proof password ceremony | |
| Kellenberger | Analyzing the Resilience of Two-Factor Authentication Techniques against Runtime Phishing Attacks | |
| Auti et al. | Captcha as a Graphical Password with Multilayered Enhanced Security by Clique Point | |
| Subramanyam et al. | A Study of Captcha Techniques and Development of SUPER Captcha for Secured Web Transactions |