{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T19:10:05Z","timestamp":1751569805535,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031877711"},{"type":"electronic","value":"9783031877728"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87772-8_28","type":"book-chapter","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T07:36:18Z","timestamp":1745307378000},"page":"335-344","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Enabled Verifiable Credential CAPTCHA"],"prefix":"10.1007","author":[{"given":"Nghia","family":"Dinh","sequence":"first","affiliation":[]},{"given":"Huy Tran","family":"Tien","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Ogiela","sequence":"additional","affiliation":[]},{"given":"Vinh Truong","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Vaclav","family":"Snasel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,23]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"von Ahn, L., Blum, M., Langford.J.: CAPTCHA: using hard AI problems for security (2003)","DOI":"10.1007\/3-540-39200-9_18"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13635-022-00134-9","volume":"2022","author":"N Dinh","year":"2022","unstructured":"Dinh, N., Ogiela, L.: Human-artificial intelligence approaches for secure analysis in CAPTCHA codes. EURASIP J. Info. Secur. 2022, 8 (2022). https:\/\/doi.org\/10.1186\/s13635-022-00134-9","journal-title":"EURASIP J. Info. Secur."},{"key":"28_CR3","doi-asserted-by":"publisher","unstructured":"Dinh, N., Tran-Trung, K., Truong Hoang, V.: Augment CAPTCHA security using adversarial examples with neural style transfer. IEEE Access. 11, 83553\u201383561 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3298442","DOI":"10.1109\/ACCESS.2023.3298442"},{"key":"28_CR4","doi-asserted-by":"publisher","unstructured":"Dinh, N., Nguyen, T., Truong, V.: zxCAPTCHA: new security-enhanced CAPTCHA. In: 2023 15th International Conference on Knowledge and Smart Technology (KST), Phuket, Thailand, pp. 1\u20136 (2023). https:\/\/doi.org\/10.1109\/KST57286.2023.10086931","DOI":"10.1109\/KST57286.2023.10086931"},{"key":"28_CR5","doi-asserted-by":"publisher","unstructured":"Trong, N.D., Huong, T.H., Hoang, V.T. New cognitive deep-learning CAPTCHA. Sensors 23, 2338. (2023). https:\/\/doi.org\/10.3390\/s23042338","DOI":"10.3390\/s23042338"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Ogiela, M.R., Krzyworzeka, N., Ogiela, L.: Application of knowledge-based cognitive CAPTCHA in cloud of things security. Concurrency Comput. Pract. Experience. 30 (21), e4769 (2018)","DOI":"10.1002\/cpe.4769"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Ogiela, L., Ogiela, M.R.: Visual cognitive CAPTCHA based on expert knowledge. In: Proceedings of 2019 11th International Conference on Computer and Automation Engineering, (ICCAE 2019), February 23\u201325, pp. 17\u201320 The University of Western Australia, Perth, Australia, ACM 2019 Association for Computing Machinery, ACM ISBN 978\u20131\u20134503\u20136287\u20130\/19\/02 (2019)","DOI":"10.1145\/3313991.3314012"},{"key":"28_CR8","doi-asserted-by":"publisher","unstructured":"Ogiela, L., Ogiela, U., Ogiela, M.R.: Cognitive CAPTCHA based on perceptual abilities. In: A.J. Tall\u00f3n-Ballesteros (Ed.), Fuzzy Systems and Data Mining V, Proceedings of the 5th International Conference on Fuzzy Systems and Data Mining (FSDM 2019), Frontiers in Artificial Intelligence and Applications, IOS Press, vol. 320, pp. 958\u2013962 (2019). https:\/\/doi.org\/10.3233\/FAIA190270","DOI":"10.3233\/FAIA190270"},{"key":"28_CR9","doi-asserted-by":"publisher","unstructured":"Joseph, W., Kevin, C.: Best practice in multi-factor authentication. Semiconductor Sci. Inf. Dev. 3 (2021). https:\/\/doi.org\/10.30564\/ssid.v3i1.3152","DOI":"10.30564\/ssid.v3i1.3152"},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"146","DOI":"10.3390\/fi15040146","volume":"15","author":"SP Otta","year":"2023","unstructured":"Otta, S.P., Panda, S., Gupta, M., Hota, C.: A systematic survey of multi-factor authentication for cloud infrastructure. Future Internet 15, 146 (2023). https:\/\/doi.org\/10.3390\/fi15040146","journal-title":"Future Internet"},{"key":"28_CR11","unstructured":"End Cloudflare CAPTCHA. https:\/\/blog.cloudflare.com\/end-cloudflare-captcha\/"},{"key":"28_CR12","unstructured":"Swan, M.: Blockchain: Blueprint for a new economy. O\u2019Reilly Media Inc., (2015)"},{"key":"28_CR13","first-page":"416","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 416\u2013432. Springer, Berlin (2003)"},{"key":"28_CR14","doi-asserted-by":"publisher","unstructured":"Dinh, N., Truong Hoang, V.: Recent advances of captcha security analysis: a short literature review. Proc. Comput. Sci. 218, 2550\u20132562 (2023). ISSN 1877\u20130509, https:\/\/doi.org\/10.1016\/j.procs.2023.01.229","DOI":"10.1016\/j.procs.2023.01.229"},{"key":"28_CR15","doi-asserted-by":"publisher","unstructured":"Chaum, D, Evertse, J.-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Conference on the Theory and Application of Cryptographic Techniques, Springer, Berlin, pp. 118\u2013167 (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_10","DOI":"10.1007\/3-540-47721-7_10"},{"key":"28_CR16","doi-asserted-by":"publisher","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: International Workshop on Public Key Cryptography, Springer, Berlin, pp. 31\u201346 (2003) https:\/\/doi.org\/10.1007\/3-540-36288-6_3","DOI":"10.1007\/3-540-36288-6_3"},{"key":"28_CR17","doi-asserted-by":"publisher","unstructured":"Micali, S., Ohta, K, Reyzin, L.: Accountable-subgroup multisignatures. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, 5\u20138, pp. 245\u2013254 (2001). https:\/\/doi.org\/10.1145\/501983.502017","DOI":"10.1145\/501983.502017"},{"key":"28_CR18","unstructured":"Patricia Merkle tree. https:\/\/ethereum.org\/vi\/developers\/docs\/data-structures-and-encoding\/patricia-merkle-trie\/"},{"key":"28_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 36\u201363 (2001). https:\/\/doi.org\/10.1007\/s102070100002","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87772-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T18:38:07Z","timestamp":1751567887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87772-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877711","9783031877728"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87772-8_28","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"23 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}