{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T22:27:28Z","timestamp":1763591248146,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1255919"],"award-info":[{"award-number":["CNS-1255919"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590298","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"195-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["A three-way investigation of a game-CAPTCHA"],"prefix":"10.1145","author":[{"given":"Manar","family":"Mohamed","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Niharika","family":"Sachdeva","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, Delhi, India"}]},{"given":"Michael","family":"Georgescu","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Song","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Nitesh","family":"Saxena","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Chengcui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Ponnurangam","family":"Kumaraguru","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, Birmingham, AL, USA"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]},{"given":"Wei-Bang","family":"Chen","sequence":"additional","affiliation":[{"name":"Virginia State University, Petersburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cracking the areyouahuman captcha. http:\/\/spamtech.co.uk\/software\/bots\/cracking-the-areyouhuman-captcha\/.  Cracking the areyouahuman captcha. http:\/\/spamtech.co.uk\/software\/bots\/cracking-the-areyouhuman-captcha\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766196"},{"key":"e_1_3_2_1_3_1","unstructured":"Amayeta. Swf encrypt: Encrypt obfuscate & protect your flash swf actionscript & resources from decompilers. http:\/\/www.amayeta.com\/software\/swfencrypt\/.  Amayeta. Swf encrypt: Encrypt obfuscate & protect your flash swf actionscript & resources from decompilers. http:\/\/www.amayeta.com\/software\/swfencrypt\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Are You a Human. https:\/\/www.areyouahuman.com\/.  Are You a Human. https:\/\/www.areyouahuman.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Are You a Human. Terms of service. Available at: http:\/\/portal.areyouahuman.com\/termsofservice.  Are You a Human. Terms of service. Available at: http:\/\/portal.areyouahuman.com\/termsofservice."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310802205776"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_15"},{"key":"e_1_3_2_1_8_1","volume-title":"Usability Evaluation in Industry","author":"Brooke J.","year":"1996","unstructured":"J. Brooke . SUS: a \"quick and dirty\" usability scale . In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry . Taylor and Francis , London , 1996 . J. Brooke. SUS: a \"quick and dirty\" usability scale. In P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, 1996."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"e_1_3_2_1_10_1","volume-title":"Boing Boing, Available at: http:\/\/www.boingboing.net\/2004\/01\/27\/solving_and_creating.html","author":"Doctorow C.","year":"2004","unstructured":"C. Doctorow . Solving and Creating CAPTCHAs with Free Porn . In Boing Boing, Available at: http:\/\/www.boingboing.net\/2004\/01\/27\/solving_and_creating.html , 2004 . C. Doctorow. Solving and Creating CAPTCHAs with Free Porn. In Boing Boing, Available at: http:\/\/www.boingboing.net\/2004\/01\/27\/solving_and_creating.html, 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055070"},{"key":"e_1_3_2_1_12_1","author":"Chen S.","year":"2001","unstructured":"S. ching Chen , M. ling Shyu , C. Zhang , and R. L. Kashyap . Identifying overlapped objects for video indexing and modeling in multimedia database systems. In Multimedia Database Systems, International Journal on Artificial Intelligence Tools , 2001 . S. ching Chen, M. ling Shyu, C. Zhang, and R. L. Kashyap. Identifying overlapped objects for video indexing and modeling in multimedia database systems. In Multimedia Database Systems, International Journal on Artificial Intelligence Tools, 2001.","journal-title":"In Multimedia Database Systems, International Journal on Artificial Intelligence Tools"},{"key":"e_1_3_2_1_13_1","unstructured":"Dancho Danchev. Inside indias captcha solving economy. Available at: http:\/\/blogs.zdnet.com\/security\/?p=1835.  Dancho Danchev. Inside indias captcha solving economy. Available at: http:\/\/blogs.zdnet.com\/security\/?p=1835."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774483"},{"key":"e_1_3_2_1_15_1","volume-title":"Computer World, Available at: http:\/\/www.computerworld.com\/s\/article\/9061558\/Spammers_bot_cracks_Microsoft_s_CAPTCHA_","author":"Keizer G.","year":"2008","unstructured":"G. Keizer . Spammers? Bot Cracks Microsoft's CAPTCHA. In Computer World, Available at: http:\/\/www.computerworld.com\/s\/article\/9061558\/Spammers_bot_cracks_Microsoft_s_CAPTCHA_ , 2008 . G. Keizer. Spammers? Bot Cracks Microsoft's CAPTCHA. In Computer World, Available at: http:\/\/www.computerworld.com\/s\/article\/9061558\/Spammers_bot_cracks_Microsoft_s_CAPTCHA_, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064009.1064026"},{"key":"e_1_3_2_1_17_1","first-page":"110","volume-title":"CAPTCHAs: An Artificial Intelligence Application to Web Security. Advances in Computers","author":"Hidalgo J. M. G.","year":"2011","unstructured":"J. M. G. Hidalgo and G. Alvarez . CAPTCHAs: An Artificial Intelligence Application to Web Security. Advances in Computers , Volume 83 (editor: Marvin V. Zelkowitz) , pages 110 -- 181 , 2011 . J. M. G. Hidalgo and G. Alvarez. CAPTCHAs: An Artificial Intelligence Application to Web Security. Advances in Computers, Volume 83 (editor: Marvin V. Zelkowitz), pages 110--181, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455839"},{"key":"e_1_3_2_1_19_1","volume-title":"Available at: http:\/\/www.kloover.com\/2008\/05\/12\/breaking-the-paypalcom-captcha","author":"Kluever K.","year":"2008","unstructured":"K. Kluever . Breaking the PayPal .com CAPTCHA. Available at: http:\/\/www.kloover.com\/2008\/05\/12\/breaking-the-paypalcom-captcha , 2008 . K. Kluever. Breaking the PayPal.com CAPTCHA. Available at: http:\/\/www.kloover.com\/2008\/05\/12\/breaking-the-paypalcom-captcha, 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"Available at: http:\/\/biology.clemson.edu\/bpc\/bp\/Lab\/110\/reaction.htm","author":"Kosinski R.","year":"2012","unstructured":"R. Kosinski . A literature review on reaction time. Available at: http:\/\/biology.clemson.edu\/bpc\/bp\/Lab\/110\/reaction.htm , 2012 . R. Kosinski. A literature review on reaction time. Available at: http:\/\/biology.clemson.edu\/bpc\/bp\/Lab\/110\/reaction.htm, 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02806-9_12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23021"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symposium","author":"Motoyama M.","year":"2010","unstructured":"M. Motoyama , K. Levchenko , C. Kanich , D. McCoy , G. M. Voelker , and S. Savage . Re: Captchas-understanding captcha-solving services in an economic context . In USENIX Security Symposium , 2010 . M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: Captchas-understanding captcha-solving services in an economic context. In USENIX Security Symposium, 2010."},{"key":"e_1_3_2_1_24_1","unstructured":"NuCaptcha. Nucaptcha: Adaptive captcha authentication. http:\/\/www.nucaptcha.com\/.  NuCaptcha. Nucaptcha: Adaptive captcha authentication. http:\/\/www.nucaptcha.com\/."},{"key":"e_1_3_2_1_25_1","unstructured":"J. Ogden. Captcha can kill your conversion rate. Available at: http:\/\/www.evancarmichael.com\/Marketing\/6352\/CAPTCHA-Can-Kill-Your-Conversion-Rate.html.  J. Ogden. Captcha can kill your conversion rate. Available at: http:\/\/www.evancarmichael.com\/Marketing\/6352\/CAPTCHA-Can-Kill-Your-Conversion-Rate.html."},{"key":"e_1_3_2_1_26_1","unstructured":"PRNewsWire. Are you a human's user-friendly game-based security solution aims to replace distorted text captchas. Available at: http:\/\/www.prnewswire.com\/news-releases\/are-you-a-humans-user-friendly-game-based-security-solution-aims-to-replace-distorted-text-captchas-152266285.html.  PRNewsWire. Are you a human's user-friendly game-based security solution aims to replace distorted text captchas. Available at: http:\/\/www.prnewswire.com\/news-releases\/are-you-a-humans-user-friendly-game-based-security-solution-aims-to-replace-distorted-text-captchas-152266285.html."},{"key":"e_1_3_2_1_27_1","volume-title":"Googles CAPTCHA Busted in Recent Spammer Tactics. Available at: http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx","author":"Prasad S.","year":"2008","unstructured":"S. Prasad . Googles CAPTCHA Busted in Recent Spammer Tactics. Available at: http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx , 2008 . S. Prasad. Googles CAPTCHA Busted in Recent Spammer Tactics. Available at: http:\/\/securitylabs.websense.com\/content\/Blogs\/2919.aspx, 2008."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2010.16"},{"key":"e_1_3_2_1_30_1","volume-title":"USENIX Security","author":"Xu Y.","year":"2012","unstructured":"Y. Xu , G. Reynaga , S. Chiasson , J.-M. Frahm , F. Monrose , and P. C. van Oorschot . Security and usability challenges of moving-object captchas: Decoding codewords in motion . In USENIX Security , 2012 . Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, and P. C. van Oorschot. Security and usability challenges of moving-object captchas: Decoding codewords in motion. In USENIX Security, 2012."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866329"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Kyoto Japan","acronym":"ASIA CCS '14"},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:51Z","timestamp":1750229751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590298"}},"subtitle":["automated attacks, relay attacks and usability"],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":31,"alternative-id":["10.1145\/2590296.2590298","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590298","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}