{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T10:07:04Z","timestamp":1748426824328},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642404979"},{"type":"electronic","value":"9783642404986"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40498-6_28","type":"book-chapter","created":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T16:34:09Z","timestamp":1375115649000},"page":"358-365","source":"Crossref","is-referenced-by-count":2,"title":["On Users\u2019 Preference on Localized vs. Latin-Based CAPTCHA Challenges"],"prefix":"10.1007","author":[{"given":"Christos","family":"Fidas","sequence":"first","affiliation":[]},{"given":"Artemios G.","family":"Voyiatzis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of ACM SOUPS 2008, pp. 44\u201352 (2008)","DOI":"10.1145\/1408664.1408671"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Burzstein, E., Martin, M., Mitchell, J.C.: Text-based CAPTCHA Strengths and Weaknesses. In: Proceedings of ACM CSS 2011, pp. 125\u2013138 (2011)","DOI":"10.1145\/2046707.2046724"},{"key":"28_CR3","unstructured":"El Ahmad, A.S., Yan, J., Tayara, M.: The Robustness of Google CAPTCHAs. Newcastle University Tech. Report CS-TR-1278 (September 2011)"},{"key":"28_CR4","first-page":"345","volume-title":"Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (CCS 2005)","author":"P. Matthews","year":"2005","unstructured":"Matthews, P., Zou, C.C.: Scene tagging: image-based CAPTCHA using image composition and object relationships. In: Proc. of the 5th ACM Symposium on Information, Computer and Communications Security (CCS 2005), pp. 345\u2013350. ACM, New York (2005)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"He, P., Sun, Y., Zheng, W., Wen, X.: Filtering short message spam of group sending using CAPTCHA. In: Proceedings of the First International Workshop on Knowledge Discovery and Data Mining (WKDD 2008), pp. 558\u2013561 (2008)","DOI":"10.1109\/WKDD.2008.131"},{"key":"28_CR6","unstructured":"Kluever, K.A., Zanibbi, R.: Balancing usability and security in a video CAPTCHA. In: Proceedings of ACM SOUPS 2005, pp. 14:1\u201314:11. ACM, New York (2005)"},{"key":"28_CR7","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1109\/ICIS.2009.125","volume-title":"Proceedings of the 2009 Eight IEEE\/ACIS International Conference on Computer and Information Science","author":"H. Zhang","year":"2009","unstructured":"Zhang, H., Wen, X., He, P., Zheng, W.: Dealing with telephone fraud using CAPTCHA. In: Proceedings of the 2009 Eight IEEE\/ACIS International Conference on Computer and Information Science, pp. 1096\u20131099. IEEE Computer Society, Washington, DC (2009)"},{"key":"28_CR8","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1145\/1101149.1101218","volume-title":"Proceedings of the 13th Annual ACM International Conference on Multimedia","author":"R. Datta","year":"2005","unstructured":"Datta, R., Li, J., Wang, J.Z.: IMAGINATION: A robust image-based CAPTCHA generation system. In: Proceedings of the 13th Annual ACM International Conference on Multimedia, pp. 331\u2013334. ACM, New York (2005)"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Cui, J., Zhang, W., Peng, Y., Liang, Y., Xiao, B., Mei, J., Zhang, D., Wang, X.: A 3-layer dynamic CAPTCHA implementation. In: 2010 Second International Workshop on Education Technology and Computer Science (ETCS), pp. 23\u201326 (2010)","DOI":"10.1109\/ETCS.2010.575"},{"key":"28_CR10","unstructured":"Lin, R., Huang, S.Y., Bell, G.B.: A new CAPTCHA interface design for mobile devices. In: Lutteroth, C., Shen, H. (eds.) Australasian User Interface Conference (AUIC 2011), pp. 3\u20138. ACS (2011)"},{"key":"28_CR11","unstructured":"Banday, M., Shah, N.: Image Fip CAPTCHA. ISeCure, The ISC International Journal of Information Security, 105\u2013123 (2009)"},{"key":"28_CR12","first-page":"1","volume":"9","author":"C.J. Ho","year":"2011","unstructured":"Ho, C.J., Wu, C.C., Chen, K.T., Lei, C.L.: DevilTyper: a game for CAPTCHA usability evaluation. Comput. Entertain.\u00a09, 3:1\u20133:14 (2011)","journal-title":"Comput. Entertain."},{"key":"28_CR13","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1145\/1296843.1296894","volume-title":"Proceedings of the 9th International ACM SIGACCESS Conference on Computers and Accessibility","author":"J. Holman","year":"2007","unstructured":"Holman, J., Lazar, J., Feng, J.H., D\u2019Arcy, J.: Developing usable CAPTCHAs for blind users. In: Proceedings of the 9th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 245\u2013246. ACM, New York (2007)"},{"key":"28_CR14","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1145\/1772690.1772774","volume-title":"Proceedings of the 19th International Conference on World Wide Web","author":"S.A. Ross","year":"2010","unstructured":"Ross, S.A., Halderman, J.A., Finkelstein, A.: Sketcha: a CAPTCHA based on line drawings of 3D models. In: Proceedings of the 19th International Conference on World Wide Web, pp. 821\u2013830. ACM, New York (2010)"},{"issue":"5895","key":"28_CR15","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1126\/science.1160379","volume":"321","author":"L. Ahn von","year":"2008","unstructured":"von Ahn, L., Maurer, B., McMillen, C., Abraham, D., Blum, M.: reCAPTCHA: Human-Based Character Recognition via Web Security Measures. Science\u00a0321(5895), 1465 (2008)","journal-title":"Science"},{"key":"28_CR16","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/SP.2010.31","volume-title":"Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP 2010)","author":"E. Bursztein","year":"2010","unstructured":"Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D.: How good are humans at solving CAPTCHAs? A large scale evaluation. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy (SP 2010), pp. 399\u2013413. IEEE Computer Society, Washington, DC (2010)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Banday, M.T., Shah, N.A.: Challenges of CAPTCHA in the accessibility of Indian regional websites. In: Proceedings of the Fourth Annual ACM Bangalore Conference (COMPUTE 2011), pp. 31:1\u201331:4. ACM, New York (2011)","DOI":"10.1145\/1980422.1980453"},{"key":"28_CR18","doi-asserted-by":"crossref","unstructured":"Lee, Y.L., Hsu, C.H.: Usability study of text-based CAPTCHAs. Displays\u00a032, 81\u201386","DOI":"10.1016\/j.displa.2010.12.004"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Fidas, C., Voyiatzis, A.G., Avouris, N.M.: On the necessity of user-friendly CAPTCHA. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems (CHI 2011), pp. 2623\u20132626 (2011)","DOI":"10.1145\/1978942.1979325"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Belk, M., Fidas, C.A., Germanakos, P., Samaras, G.: Do Cognitive Styles of User Affect Preference and Performance related to CAPTCHA? In: Proceedings of the 2012 Annual Conference on Human Factors in Computing Systems (CHI 2012), pp. 1487\u20131492 (2012)","DOI":"10.1145\/2212776.2223660"},{"issue":"2","key":"28_CR21","doi-asserted-by":"publisher","first-page":"74","DOI":"10.4018\/jwp.2012040105","volume":"4","author":"A. Khalil","year":"2012","unstructured":"Khalil, A., Abdallah, S., Ahmed, S., Hajjdiab, H.: Script Familiarity and Its Effect on CAPTCHA Usability: An Experiment with Arab Participants. International Journal of Web Portals\u00a04(2), 74\u201387 (2012)","journal-title":"International Journal of Web Portals"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Wei, T.-E., Jeng, A.B., Lee, H.-M.: GeoCAPTCHA - A novel personalized CAPTCHA using geographic concept to defend against 3rd Party Human Attack. In: 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), pp. 392\u2013399 (2012)","DOI":"10.1109\/PCCC.2012.6407782"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40498-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,19]],"date-time":"2019-07-19T18:46:24Z","timestamp":1563561984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40498-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642404979","9783642404986"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40498-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}