{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:18:56Z","timestamp":1763662736315,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,2,25]],"date-time":"2008-02-25T00:00:00Z","timestamp":1203897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,2,25]]},"DOI":"10.1145\/1411759.1411783","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T11:59:52Z","timestamp":1221739192000},"page":"91-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Making CAPTCHAs clickable"],"prefix":"10.1145","author":[{"given":"Richard","family":"Chow","sequence":"first","affiliation":[{"name":"Palo Alto Research Center"}]},{"given":"Philippe","family":"Golle","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center"}]},{"given":"Markus","family":"Jakobsson","sequence":"additional","affiliation":[{"name":"Palo Alto Research Center"}]},{"given":"Lusha","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University at Bloomington"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University at Bloomington"}]}],"member":"320","published-online":{"date-parts":[[2008,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BotBarrier.com. http:\/\/www.botbarrier.com\/  BotBarrier.com. http:\/\/www.botbarrier.com\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of NIPS","author":"Chellapilla K.","year":"2004","unstructured":"K. Chellapilla , P. Simard . Using Machine Learning to Break Visual Human Interaction Proofs (HIPs) . In Proc. of NIPS 2004 . K. Chellapilla, P. Simard. Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In Proc. of NIPS 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055070"},{"key":"e_1_3_2_1_4_1","volume-title":"BusinessWeek","author":"Fraud Click","year":"2006","unstructured":"Click Fraud , the dark side of online advertising . BusinessWeek , October 2006 . http:\/\/www.businessweek.com\/magazine\/content\/06_40\/b4003001.htm Click Fraud, the dark side of online advertising. BusinessWeek, October 2006. http:\/\/www.businessweek.com\/magazine\/content\/06_40\/b4003001.htm"},{"key":"e_1_3_2_1_5_1","unstructured":"M. Davis. \"Aoccdrnig to a rscheearch at Cmabrigde Uinervtisy\". http:\/\/www.mrc-cbu.cam.ac.uk\/~mattd\/Cmabrigde\/  M. Davis. \"Aoccdrnig to a rscheearch at Cmabrigde Uinervtisy\". http:\/\/www.mrc-cbu.cam.ac.uk\/~mattd\/Cmabrigde\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315291"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"P. Golle. Machine Learning Attacks Against the ASIRRA CAPTCHA. IACR Cryptology ePrint Archive report 2008\/126.  P. Golle. Machine Learning Attacks Against the ASIRRA CAPTCHA. IACR Cryptology ePrint Archive report 2008\/126.","DOI":"10.1145\/1455770.1455838"},{"key":"e_1_3_2_1_8_1","unstructured":"Google CAPTCHA. https:\/\/www.google.com\/accounts\/DisplayUnlockCaptcha  Google CAPTCHA. https:\/\/www.google.com\/accounts\/DisplayUnlockCaptcha"},{"key":"e_1_3_2_1_9_1","volume-title":"Face of the Web","author":"Research Ipsos","year":"2006","unstructured":"Ipsos Research . Face of the Web 2006 . http:\/\/www.ipsos-na.com\/news\/pressrelease.cfm?id=3049 Ipsos Research. Face of the Web 2006. http:\/\/www.ipsos-na.com\/news\/pressrelease.cfm?id=3049"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11427896_7"},{"key":"e_1_3_2_1_11_1","unstructured":"G. Mori. Personal communication.  G. Mori. Personal communication."},{"key":"e_1_3_2_1_12_1","unstructured":"The Official CAPTCHA Site. http:\/\/www.captcha.net.  The Official CAPTCHA Site. http:\/\/www.captcha.net."},{"key":"e_1_3_2_1_13_1","volume-title":"Nottingham UK","author":"Rawlinson G. E.","year":"1976","unstructured":"G. E. Rawlinson , \"The significance of letter position in word recognition,\" PhD Thesis, Psychology Department, University of Nottingham , Nottingham UK , 1976 . G. E. Rawlinson, \"The significance of letter position in word recognition,\" PhD Thesis, Psychology Department, University of Nottingham, Nottingham UK, 1976."},{"key":"e_1_3_2_1_14_1","first-page":"294","volume-title":"Proc. of Eurocrypt '03","author":"von Ahn L.","unstructured":"L. von Ahn , M. Blum , N. J. Hopper and J. Langford . CAPTCHA: Using hard AI problems for security . In Proc. of Eurocrypt '03 , pp. 294 -- 311 . L. von Ahn, M. Blum, N. J. Hopper and J. Langford. CAPTCHA: Using hard AI problems for security. In Proc. of Eurocrypt '03, pp. 294--311."},{"key":"e_1_3_2_1_15_1","unstructured":"O. Warner. Kittenauth. http:\/\/www.thepcspy.com\/kittenauth  O. Warner. Kittenauth. http:\/\/www.thepcspy.com\/kittenauth"}],"event":{"name":"HotMobile08: Workshop on Mobile Computing Systems and Applications","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Napa Valley California","acronym":"HotMobile08"},"container-title":["Proceedings of the 9th workshop on Mobile computing systems and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411759.1411783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1411759.1411783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:30Z","timestamp":1750253370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1411759.1411783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,2,25]]},"references-count":15,"alternative-id":["10.1145\/1411759.1411783","10.1145\/1411759"],"URL":"https:\/\/doi.org\/10.1145\/1411759.1411783","relation":{},"subject":[],"published":{"date-parts":[[2008,2,25]]},"assertion":[{"value":"2008-02-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}