CAPTCHA

Results: 267



#Item
11Animated Captchas And Games For Advertising Suhas Aggarwal IIT Guwahati May

Animated Captchas And Games For Advertising Suhas Aggarwal IIT Guwahati May

Add to Reading List

Source URL: wic.litislab.fr

Language: English - Date: 2013-12-09 08:25:58
12Come effettuare l’iscrizione  Premi “Registrati” e compila i campi richiesti, inserisci un indirizzo mail valido dove verrà inviato la mail d’attivazione. Premi “Start” nel campo “Captcha” ed eseguilo. A

Come effettuare l’iscrizione Premi “Registrati” e compila i campi richiesti, inserisci un indirizzo mail valido dove verrà inviato la mail d’attivazione. Premi “Start” nel campo “Captcha” ed eseguilo. A

Add to Reading List

Source URL: www.emmausrivera.ch

- Date: 2013-12-10 03:12:11
    13Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security

    Using Automatic Speech Recognition for Attacking Acoustic CAPTCHAs: The Trade-off between Usability and Security

    Add to Reading List

    Source URL: www.ei.rub.de

    Language: English - Date: 2014-11-07 01:28:08
    14Human Computation: Experience and Thoughts Kuan-Ta Chen Institute of Information Science, Academia Sinica   In this position paper, I will first summarize our previous

    Human Computation: Experience and Thoughts Kuan-Ta Chen Institute of Information Science, Academia Sinica In this position paper, I will first summarize our previous

    Add to Reading List

    Source URL: crowdresearch.org

    Language: English - Date: 2011-03-24 21:28:46
    15Balancing Usability and Security in a Video CAPTCHA Kurt Alfred Kluever Richard Zanibbi  Google, Inc.

    Balancing Usability and Security in a Video CAPTCHA Kurt Alfred Kluever Richard Zanibbi Google, Inc.

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2009-05-29 13:18:18
    16Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

    Hidden Voice Commands Nicholas Carlini∗ University of California, Berkeley Tavish Vaidya Georgetown University Clay Shields

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2016-06-29 23:07:54
    17

    PDF Document

    Add to Reading List

    Source URL: www.cis.rit.edu

    Language: English - Date: 2013-07-24 23:05:30
    18I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman Collin Jackson

    I Still Know What You Visited Last Summer Leaking browsing history via user interaction and side channel attacks Zachary Weinberg Eric Y. Chen Pavithra Ramesh Jayaraman Collin Jackson

    Add to Reading List

    Source URL: research.owlfolio.org

    Language: English - Date: 2016-04-20 11:44:16
    19No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego

    No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego

    Add to Reading List

    Source URL: static.usenix.org

    Language: English - Date: 2011-08-22 17:59:42
    20A BRAM H INDLE Computer Science Department Engineering II Davis, CA, USA 95616

    A BRAM H INDLE Computer Science Department Engineering II Davis, CA, USA 95616

    Add to Reading List

    Source URL: softwareprocess.es

    Language: English - Date: 2011-03-14 17:34:43