{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:25:39Z","timestamp":1776331539745,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642417160","type":"print"},{"value":"9783642417177","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41717-7_2","type":"book-chapter","created":{"date-parts":[[2013,11,5]],"date-time":"2013-11-05T06:40:29Z","timestamp":1383633629000},"page":"3-10","source":"Crossref","is-referenced-by-count":1,"title":["Towards New Security Primitives Based on Hard AI Problems"],"prefix":"10.1007","author":[{"given":"Bin B.","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jeff","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"102","volume":"63","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: PassPoints: design and longitudinal evaluation of a graphical password system. Int. J of HCI\u00a063, 102\u2013127 (2005)","journal-title":"Int. J of HCI"},{"key":"2_CR2","unstructured":"Thorpe, J., van Oorschot, P.C.: Human-seeded attacks and exploiting hot spots in graphical passwords. USENIX Security (2007)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Dirik, A.E., Memon, N., Birget, J.-C.: Modeling user choice in the PassPoints graphical password scheme. ACM SOUPS (2007)","DOI":"10.1145\/1280680.1280684"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Zhu, B.B., Yan, J., Li, Q., Yang, C., Liu, J., Xu, N., Yi, M., Cai, K.: Attacks and design of image recognition CAPTCHAs. ACM CCS, 187\u2013200 (2010)","DOI":"10.1145\/1866307.1866329"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Pinkas, B., Sander, T.: Securing passwords against dictionary attacks. ACM CCS, 161\u2013170 (2002)","DOI":"10.1145\/586110.586133"},{"key":"2_CR6","unstructured":"Lin, R., Huang, S.-Y., Bell, G.B., Lee, Y.-K.: A new Captcha interface design for mobile devices. In: Australasian User Interface Conference (2011)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11427896_1","volume-title":"Human Interactive Proofs","author":"K. Chellapilla","year":"2005","unstructured":"Chellapilla, K., Larson, K., Simard, P.Y., Czerwinski, M.: Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs). In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol.\u00a03517, pp. 1\u201326. Springer, Heidelberg (2005)"},{"key":"2_CR8","unstructured":"Wolverton, T.: Hackers attack eBay accounts. ZDNet (March 26, 2002), \n                  \n                    http:\/\/www.zdnet.co.uk\/news\/networking\/2002\/03\/26\/hackers-attack-ebay-accounts-2107350\/"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Kim, S., Cao, X., Zhang, H., Tan, D.: Enabling concurrent dual views on common LCD screens. In: Sig. CHI 2012, pp. 2175\u20132184 (2012)","DOI":"10.1145\/2207676.2208369"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 294\u2013311. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41717-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T02:45:34Z","timestamp":1558665934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41717-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642417160","9783642417177"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41717-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}