{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:26:32Z","timestamp":1757622392454,"version":"3.44.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032006325"},{"type":"electronic","value":"9783032006332"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00633-2_14","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:26Z","timestamp":1754648126000},"page":"235-252","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating Turnstile as\u00a0a\u00a0Privacy-Conscious Alternative to\u00a0reCAPTCHA"],"prefix":"10.1007","author":[{"given":"Maxime","family":"Sateur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1946-4660","authenticated-orcid":false,"given":"Javier","family":"Mart\u00ednez Llamas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6279-4430","authenticated-orcid":false,"given":"Davy","family":"Preuveneers","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"124396","DOI":"10.1109\/ACCESS.2021.3111098","volume":"9","author":"M Antal","year":"2021","unstructured":"Antal, M., Buza, K., Fejer, N.: SapiAgent: a bot based on deep learning to generate human-like mouse trajectories. IEEE Access 9, 124396\u2013124408 (2021)","journal-title":"IEEE Access"},{"key":"14_CR2","unstructured":"Cloudflare: The end of the captcha (2023). https:\/\/blog.cloudflare.com\/end-cloudflare-captcha\/. Accessed 20 Sep 2024"},{"key":"14_CR3","unstructured":"Cloudflare: Cloudflare challenges: managed challenge (2024). https:\/\/developers.cloudflare.com\/waf\/reference\/cloudflare-challenges\/. Accessed 20 Sep 2024"},{"key":"14_CR4","unstructured":"Cloudflare: Cloudflare ray id (2024). https:\/\/developers.cloudflare.com\/fundamentals\/reference\/cloudflare-ray-id\/. Accessed 20 Sep 2024"},{"key":"14_CR5","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s: D\u00e9lib\u00e9ration de la formation restreinte n$$^{\\circ }$$ san-2023-003 du 16 mars 2023 concernant la soci\u00e9t\u00e9 cityscoot (2023). https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000047346903. Accessed 12 Sep 2024"},{"key":"14_CR6","unstructured":"European Parliament, Council of the European Union: Directive 2002\/58\/EC of the European parliament and of the council of 12 july 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (directive on privacy and electronic communications). OJ L 201, 37\u201347 (2002)"},{"key":"14_CR7","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2016\/679 of the European parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation). OJ L 119, 1\u201388 (2016)"},{"key":"14_CR8","unstructured":"European Parliament, Council of the European Union: Commission implementing decision (EU) 2016\/1250 of 12 july 2016 pursuant to directive 95\/46\/EC of the European parliament and of the council on the adequacy of the protection provided by the EU-U.S. privacy shield (notified under document c(2016) 4176). OJ L 207, 1\u2013112 (2016)"},{"key":"14_CR9","unstructured":"European Parliament, Council of the European Union: Commission implementing decision (EU) 2021\/914 of 4 june 2021 on standard contractual clauses for the transfer of personal data to third countries pursuant to regulation (EU) 2016\/679 of the European parliament and of the council. OJ L 199, 31\u201361 (2021)"},{"key":"14_CR10","unstructured":"European Parliament, Council of the European Union: Commission implementing decision EU 2023\/1795 of 10 july 2023 pursuant to regulation (EU) 2016\/679 of the European parliament and of the council on the adequate level of protection of personal data under the EU-us data privacy framework (notified under document c(2023)4745). OJ L 231, 118\u2013229 (2023)"},{"key":"14_CR11","unstructured":"Court of Justice of the European Union (CJEU): Judgment of the court (grand chamber) of 16 july 2020. data protection commissioner v facebook ireland limited and maximillian schrems. C-311\/18 (Schrems II) (2020). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:62018CJ0311"},{"issue":"9","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3477142","volume":"54","author":"M Guerar","year":"2021","unstructured":"Guerar, M., Verderame, L., Migliardi, M., Palmieri, F., Merlo, A.: Gotta captcha\u2019em all: a survey of 20 years of the human-or-computer dilemma. ACM Comput. Surv. (CSUR) 54(9), 1\u201333 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"14_CR13","unstructured":"LG M\u00fcnchen I: Endurteil vom 20.01.2022 - 3 o 17493\/20 (2022). https:\/\/openjur.de\/u\/2384915.html"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, I.: Web bot detection evasion using deep reinforcement learning. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2022)","DOI":"10.1145\/3538969.3538994"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Iliou, C., Kostoulas, T., Tsikrika, T., Katos, V., Vrochidis, S., Kompatsiaris, I.: Web bot detection evasion using generative adversarial networks. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 115\u2013120. IEEE (2021)","DOI":"10.1109\/CSR51186.2021.9527915"},{"key":"14_CR16","unstructured":"Imperva: 2024 bad bot report (2024). https:\/\/www.imperva.com\/resources\/resource-library\/reports\/2024-bad-bot-report\/"},{"key":"14_CR17","unstructured":"InsideRecaptcha (2014). https:\/\/github.com\/toogle\/InsideReCaptcha. Accessed 12 Sep 2024"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Li, X., Azad, B.A., Rahmati, A., Nikiforakis, N.: Good bot, bad bot: characterizing automated browsing activity. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 1589\u20131605. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00079"},{"key":"14_CR19","unstructured":"Naor, M.: Verification of a human in the loop or identification via the turing test (1996). http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human abs"},{"key":"14_CR20","unstructured":"Privacy Sandbox: A new path for privacy sandbox on the web (2024). https:\/\/privacysandbox.com\/intl\/en_us\/news\/privacy-sandbox-update\/. Accessed 20 Sep 2024"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Sivakorn, S., Polakis, I., Keromytis, A.D.: I am robot:(deep) learning to break semantic image captchas. In: 2016 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 388\u2013403. IEEE (2016)","DOI":"10.1109\/EuroSP.2016.37"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Tsingenopoulos, I., Preuveneers, D., Desmet, L., Joosen, W.: Captcha me if you can: imitation games with reinforcement learning. In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS &P), pp. 719\u2013735. IEEE (2022)","DOI":"10.1109\/EuroSP53844.2022.00050"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"L von Ahn","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294\u2013311. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_18"},{"issue":"06","key":"14_CR24","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MC.1984.1659158","volume":"17","author":"TA Welch","year":"1984","unstructured":"Welch, T.A.: A technique for high-performance data compression. Computer 17(06), 8\u201319 (1984)","journal-title":"Computer"},{"key":"14_CR25","unstructured":"Reverse engineering the Cloudflare JavaScript challenge (2024). https:\/\/www.zenrows.com\/blog\/bypass-cloudflare#bypass-cloudflare-waiting-room. Accessed 14 Sep 2024"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00633-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T19:41:15Z","timestamp":1757360475000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00633-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006325","9783032006332"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00633-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}