KHAP: Using Keyed Hard AI Problems to Secure Human Interfaces
暂无分享,去创建一个
[1] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[2] Daniel P. Lopresti,et al. A reverse turing test using speech , 2002, INTERSPEECH.
[3] Eric Rescorla,et al. HTTP Over TLS , 2000, RFC.
[4] Hideki Imai,et al. Human Identification Through Insecure Channel , 1991, EUROCRYPT.
[5] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Radek Vingralek,et al. How to build a trusted database system on untrusted storage , 2000, OSDI.
[7] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[8] Sean W. Smith,et al. Smart cards in hostile environments , 1996 .
[9] István Vajda,et al. Documents from malicious terminals , 2003, SPIE Microtechnologies.
[10] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[11] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.