{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:56:38Z","timestamp":1761807398250},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_24","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"367-382","source":"Crossref","is-referenced-by-count":5,"title":["The AI Hardness of CAPTCHAs does not imply Robust Network Security"],"prefix":"10.1007","author":[{"given":"Allan","family":"Caine","sequence":"first","affiliation":[]},{"given":"Urs","family":"Hengartner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/1035134.1035166","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart auto-matically. Commnications of the ACM 47(2) (2004) 57\u201360","journal-title":"Commnications of the ACM"},{"key":"24_CR2","unstructured":"Yahoo! Inc.: Yahoo e-mail sign up. http:\/\/www.yahoo.com (2007)"},{"key":"24_CR3","unstructured":"Minnesota Twins Major League Baseball: Minnesota twins electronic ticketing. http:\/\/minnesota.twins.mlb.com\/ (2007)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: Keyed-hashing for message authentication. Internet RFC 2104 (1997)","DOI":"10.17487\/rfc2104"},{"key":"24_CR5","unstructured":"Lewis, J.P.: Fast template matching. Vision Interface (1995) 120\u2013123"},{"key":"24_CR6","unstructured":"Caine, A., Hengartner, U.: Data set. http:\/\/www.cs.uwaterloo.ca\/~adcaine\/ php\/demo.htm (2007)"},{"key":"24_CR7","unstructured":"Caine, A., Hengartner, U.: Implementation of proposed protocol. http:\/\/www. cs.uwaterloo.ca\/~adcaine\/php\/wrapper.html (2007)"},{"key":"24_CR8","unstructured":"Youtube: Sign up page for youtube.com. http:\/\/www.youtube.com\/signup (2007)"},{"key":"24_CR9","unstructured":"The CAPTCHA Project at Carnegie Mellon University. http:\/\/www.captcha. net\/ (2006)"},{"key":"24_CR10","unstructured":"PWNtcha captcha decoder. http:\/\/sam.zoy.org\/pwntcha\/ (2006)"},{"key":"24_CR11","unstructured":"Fukuda, K., Garrigue, M.A., Gilman, A.: Inaccessibility of CAPTCHA. W3C (2005)"},{"key":"24_CR12","first-page":"134","volume":"1","author":"G. Mori","year":"2003","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: CVPR. Volume 1. (2003) 134\u2013141","journal-title":"CVPR"},{"key":"24_CR13","unstructured":"Doctorow, C.: Solving and creating captchas with free porn. http:\/\/boingboing.net\/2004\/01\/27\/solving_and_creating.html (2004)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: Using hard AI problems for security. Eurocrypt (2003)","DOI":"10.1007\/3-540-39200-9_18"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:12:44Z","timestamp":1619669564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_24","relation":{},"subject":[]}}