{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:08:58Z","timestamp":1730225338188,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/hpcsim.2015.7237041","type":"proceedings-article","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T17:45:56Z","timestamp":1441302356000},"page":"203-210","source":"Crossref","is-referenced-by-count":16,"title":["A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices"],"prefix":"10.1109","author":[{"given":"Meriem","family":"Guerar","sequence":"first","affiliation":[]},{"given":"Mauro","family":"Migliardi","sequence":"additional","affiliation":[]},{"given":"Alessio","family":"Merlo","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Benmohammed","sequence":"additional","affiliation":[]},{"given":"Belhadri","family":"Messabih","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SMAP.2014.29"},{"key":"ref12","article-title":"Asirra: a CAPTCHA that exploits interest-aligned manual image categorization","author":"elson","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455838"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITI.2006.1708527"},{"key":"ref15","article-title":"A new captcha interface design for mobile devices","author":"lin","year":"2011","journal-title":"ACSW 2011 Australasian User Interface Conference"},{"key":"ref16","first-page":"1385","article-title":"A Game and Accelerometer-based CAPTCHA Scheme for Mobile Learning System","author":"liao","year":"2013"},{"key":"ref17","article-title":"Mobile Financial Services Business Ecosystem Scenarios & Consequences","author":"choudhary","year":"2006","journal-title":"Mobey Forum Mobile Financial Services Ltd"},{"key":"ref18","article-title":"Sim alliance White Paper","volume":"1","year":"2011","journal-title":"Secure Authentication for Mobile Internet Services Critical Considerations V1"},{"year":"0","key":"ref19"},{"article-title":"Exploring the Usability of CAPTCHAS on Smartphones: Comparisons and Recommen-dations","year":"2015","author":"reynaga","key":"ref28"},{"key":"ref4","article-title":"Multi-digit number recognition from street view imagery using deep convolutional neural networks","author":"goodfellow","year":"2014","journal-title":"ICLRE"},{"year":"0","key":"ref27","article-title":"Giesecke& devrient: Creating confidence"},{"journal-title":"ReCAPTCHA Human-based Character Recognition Via Web Security Measures","year":"2008","author":"von ahn","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1411759.1411783"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734596"},{"key":"ref5","first-page":"427","article-title":"The Usability of Captchas on Smartphones","author":"reynaga","year":"2013","journal-title":"Proc SECRYPT"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2004.1315140"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CRiSIS.2011.6061836"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41674-3_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICETET.2009.24"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41671-2_21"},{"year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"journal-title":"Smart card with additional electronic means EP 2128805 B 1","article-title":"Patent","year":"0","key":"ref21"},{"key":"ref24","first-page":"9","article-title":"TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion","author":"cai","year":"2011","journal-title":"HotSec&#x2019; 11 Proceedings of the 6th USENIX conference on Hot topics in security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2516760.2516770"},{"key":"ref26","first-page":"7","volume":"2014","author":"kim","year":"2014","journal-title":"Spyware Resistant Smartphone User Authentication Scheme Int J Distributed Sens Netw"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"}],"event":{"name":"2015 International Conference on High Performance Computing & Simulation (HPCS)","start":{"date-parts":[[2015,7,20]]},"location":"Amsterdam, Netherlands","end":{"date-parts":[[2015,7,24]]}},"container-title":["2015 International Conference on High Performance Computing &amp; Simulation (HPCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7214433\/7237005\/07237041.pdf?arnumber=7237041","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:04:38Z","timestamp":1490378678000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7237041\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2015.7237041","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}