{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:52:13Z","timestamp":1775199133084,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,3,25]],"date-time":"2010-03-25T00:00:00Z","timestamp":1269475200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Univ Access Inf Soc"],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1007\/s10209-009-0171-2","type":"journal-article","created":{"date-parts":[[2010,3,24]],"date-time":"2010-03-24T15:54:50Z","timestamp":1269446090000},"page":"239-248","source":"Crossref","is-referenced-by-count":32,"title":["Accessible privacy and security: a universally usable human-interaction proof tool"],"prefix":"10.1007","volume":"9","author":[{"given":"Graig","family":"Sauer","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Holman","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Lazar","sequence":"additional","affiliation":[]},{"given":"Harry","family":"Hochheiser","sequence":"additional","affiliation":[]},{"given":"Jinjuan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,3,25]]},"reference":[{"key":"171_CR1","unstructured":"US Census Bureau. Americans with Disabilities: 2002. Available at: http:\/\/www.census.gov\/hhes\/www\/disability\/sipp\/disab02\/ds02ta.html (2002)"},{"key":"171_CR2","unstructured":"World Health Organization. Magnitude and causes of visual impairment. Available at: http:\/\/www.who.int\/mediacentre\/factsheets\/fs282\/en\/ (2006)"},{"issue":"8","key":"171_CR3","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/S0167-4048(03)00006-3","volume":"22","author":"J Johnston","year":"2003","unstructured":"Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Comput. Secur. 22(8), 675\u2013684 (2003)","journal-title":"Comput. Secur."},{"issue":"3","key":"171_CR4","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"MA Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the weakest link\u2014a human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013130 (2001)","journal-title":"BT Technol. J."},{"key":"171_CR5","unstructured":"D\u2019Arcy, J., Feng, J.: Investigating security-related behaviors among computer users with motor impairments. Poster abstracts of SOUPS 06. Available via http:\/\/cups.cs.cmu.edu\/soups\/2006\/posters\/darcy-poster_abstract.pdf (2006). Accessed 10 March 2007"},{"key":"171_CR6","unstructured":"World Wide Web Consortium (W3C). Inaccessibility of CAPTCHA. Availible via http:\/\/www.w3.org\/TR\/turingtest\/ (2007). Accessed 10 March 2007"},{"key":"171_CR7","unstructured":"Robinson, S.: Human or computer? Take this test. Available Via http:\/\/query.nytimes.com\/gst\/fullpage.html?res=9907E5DF163AF933A25751C1A9649C8B63 (2002). Accessed 17 March 2007"},{"key":"171_CR8","doi-asserted-by":"crossref","unstructured":"Von Ahn, L., Blum, M., Hopper, N., Langford, J.: CAPTCHA: using hard AI problems for security. Available via http:\/\/www.cs.cmu.edu\/~biglou\/captcha_crypt.pdf (2003) Accessed 3 April 2007","DOI":"10.1007\/3-540-39200-9_18"},{"key":"171_CR9","doi-asserted-by":"crossref","unstructured":"Yan, J.: A low-cost attack on a microsoft CAPTCHA. Available via http:\/\/homepages.cs.ncl.ac.uk\/jeff.yan\/msn_draft.pdf (2008). Accessed 2 June 2008","DOI":"10.1145\/1455770.1455839"},{"key":"171_CR10","doi-asserted-by":"crossref","unstructured":"Mori, G., Malik, J.: Recognizing objects in adversarial clutter: breaking a visual CAPTCHA. In: Computer Vission and Pattern Recognition (2003)","DOI":"10.1109\/CVPR.2003.1211347"},{"key":"171_CR11","unstructured":"ReCAPTCHA: Stop Spam Read Books. Available via http:\/\/recaptcha.net\/ (2007). Accessed 7 May 2008"},{"issue":"2","key":"171_CR12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/966389.966390","volume":"47","author":"L Ahn Von","year":"2004","unstructured":"Von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Comm. ACM 47(2), 57\u201360 (2004)","journal-title":"Comm. ACM"},{"key":"171_CR13","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M.: Designing human friendly human interaction proofs (HIPS). In: Proceedings of the SIGCHI conference on Human factors in computing systems (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"171_CR14","doi-asserted-by":"crossref","unstructured":"Yan, J.: Usability of CAPTCHAs or usability issues in CAPTCHA design. Available via http:\/\/cups.cs.cmu.edu\/soups\/2008\/proceedings\/p44Yan.pdf (2008). Accessed 2 June 2008","DOI":"10.1145\/1408664.1408671"},{"key":"171_CR15","unstructured":"RSA Strong Authentication. Available via http:\/\/www.rsa.com\/go\/gpage.aspx?id=44&engine=googamericasearch!795&keyword=(secure+id)&match_type = (2007). Accessed 28 June 2008"},{"key":"171_CR16","unstructured":"Elson, J., Douceur, J., Saul, J.: Asirra: A CAPTCHA that exploits interest-aligned manual image categorization. In: Proceedings of the 14th ACM conference on Computer and communications security (2007)"},{"key":"171_CR17","doi-asserted-by":"crossref","unstructured":"Datta, R., Li, J., Wang, J.: IMAGINATION: a robust image-based CAPTCHA generation system. In: Proceedings of the 13th annual ACM international conference on Multimedia (2005)","DOI":"10.1145\/1101149.1101218"},{"key":"171_CR18","doi-asserted-by":"crossref","unstructured":"Holman, J., Lazar, J., Feng, J., D\u2019Arcy, J.: Developing usable CAPTCHAs for blind users. In: Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility (2007)","DOI":"10.1145\/1296843.1296894"}],"container-title":["Universal Access in the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-009-0171-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10209-009-0171-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10209-009-0171-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,31]],"date-time":"2023-05-31T05:59:02Z","timestamp":1685512742000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10209-009-0171-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3,25]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,8]]}},"alternative-id":["171"],"URL":"https:\/\/doi.org\/10.1007\/s10209-009-0171-2","relation":{},"ISSN":["1615-5289","1615-5297"],"issn-type":[{"value":"1615-5289","type":"print"},{"value":"1615-5297","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,3,25]]}}}