{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:50Z","timestamp":1725566210523},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_22","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"257-267","source":"Crossref","is-referenced-by-count":12,"title":["Towards Human Interactive Proofs in the Text-Domain"],"prefix":"10.1007","author":[{"given":"Richard","family":"Bergmair","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Chan, T.-Y.: \n                    \n                      http:\/\/drive.to\/research"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TAI.2003.1250195","volume-title":"Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence","author":"T.-Y. Chan","year":"2003","unstructured":"Chan, T.-Y.: Using a text-to-speech synthesizer to generate a reverse turing test. In: Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, p. 226. IEEE Computer Society, Los Alamitos (2003)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Coates, A.L., Fateman, R.J.: Pessimal print: A reverse turing test. In: Sixth International Conference on Document Analysis and Recognition, ICDAR 2001 (2001)","DOI":"10.1109\/ICDAR.2001.953966"},{"key":"22_CR4","unstructured":"Edmonds, P.: Introduction to Senseval. ELRA Newsletter (2002), Available electronically: \n                    \n                      http:\/\/www.senseval.org\/publications\/senseval.pdf"},{"key":"22_CR5","unstructured":"Miller et. al. SemCor 1.6 (1998), \n                    \n                      ftp:\/\/ftp.cogsci.princeton.edu\/pub\/wordnet\/semcor16.tar.gz"},{"key":"22_CR6","unstructured":"Miller., et. al., Mihalcea,R.: Semcor 2.0. (2004), \n                    \n                      http:\/\/www.cs.unt.edu\/~rada\/downloads\/semcor\/semcor2.0.tar.gz"},{"volume-title":"WordNet, An Electronic Lexical Database","year":"1998","key":"22_CR7","unstructured":"Fellbaum, C. (ed.): WordNet, An Electronic Lexical Database. MIT Press, Cambridge (1998)"},{"key":"22_CR8","unstructured":"Godfrey, P.B.: Text-based CAPTCHA algorithms. In: First Workshop on Human Interactive Proofs (2002) (unpublished Manuscript) , \n                    \n                      http:\/\/www.aladdin.cs.cmu.edu\/hips\/events\/abs\/godfreyb_abstract.pdf"},{"key":"22_CR9","unstructured":"Miller, G.A., Beckwith, R., Fellbaum, C., Gross, D., Miller, K.: Introduction to WordNet: An on-line lexical database (August 1993), \n                    \n                      http:\/\/www.cogsci.princeton.edu\/~wn\/5papers.ps"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/948109.948114","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communication Security","author":"W.G. Morein","year":"2003","unstructured":"Morein, W.G., Stavrou, A., Cook, D.L., Keromytis, A.D., Misra, V., Rubenstein, D.: Using graphic turing tests to counter automated ddos attacks against web servers. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 8\u201319. ACM Press, New York (2003)"},{"key":"22_CR11","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: Breaking a visual CAPTCHA. In: Conference on Computer Vision and Pattern Recognition (CVPR 2003), vol.\u00a01 (2003)"},{"key":"22_CR12","unstructured":"Naor, M.: Verification of a human in the loop or identification via the turing test. (1997) (unpublished manuscript), Available electronically: \n                    \n                      http:\/\/www.wisdom.weizmann.ac.il\/~naor\/PAPERS\/human.ps"},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1145\/586110.586133","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"B. Pinkas","year":"2002","unstructured":"Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 161\u2013170. ACM Press, New York (2002)"},{"key":"22_CR14","unstructured":"Przydatek, B.: On the (im)possibility of a text-only CAPTCHA. In: First Workshop on Human Interactive Proofs (2002) (unpublished Abstract) , \n                    \n                      http:\/\/www.aladdin.cs.cmu.edu\/hips\/events\/abs\/bartosz_abstract.pdf"},{"key":"22_CR15","unstructured":"Resnik, P.: Selectional preference and sense disambiguation. In: Proceedings of the ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How? (April 1997)"},{"key":"22_CR16","unstructured":"Senseval.: (2001), \n                    \n                      http:\/\/www.sle.sharp.co.uk\/senseval2\/Results\/all_graphs.xls\n                    \n                    \n                  (accessed March 6 2004)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Simard, P.Y., Szeliski, R., Benaloh, J., Couvreur, J., Calinov, I.: Using character recognition and segmentation to tell computer from humans. In: Seventh International Conference on Document Analysis and Recognition, vol.\u00a0I (2003)","DOI":"10.1109\/ICDAR.2003.1227701"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","volume":"49","author":"A.M. Turing","year":"1950","unstructured":"Turing, A.M.: Computing machinery and intelligence. Mind\u00a049, 433\u2013460 (1950)","journal-title":"Mind"},{"key":"22_CR19","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Hips, \n                    \n                      http:\/\/www.aladdin.cs.cmu.edu\/hips\/"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"},{"issue":"2","key":"22_CR21","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Communications of the ACM\u00a047(2), 56\u201360 (2004)","journal-title":"Communications of the ACM"},{"key":"22_CR22","unstructured":"Xerox PARC.: First Workshop on Human Interactive Proofs (January 2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:29Z","timestamp":1620013949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}