{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:06Z","timestamp":1750220766776,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:00:00Z","timestamp":1608249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,18]]},"DOI":"10.1145\/3447654.3447671","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:36:12Z","timestamp":1620941772000},"page":"118-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Pixy: A Privacy-Increasing Group Creation Scheme"],"prefix":"10.1145","author":[{"given":"David","family":"M\u00f6dinger","sequence":"first","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Nicola","family":"Fr\u00f6hlich","sequence":"additional","affiliation":[{"name":"Ulm University, Germany"}]},{"given":"Franz J.","family":"Hauck","sequence":"additional","affiliation":[{"name":"Ulm University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Google Security Blog [n.d.]. Are you a robot? Introducing \u201cNo CAPTCHA reCAPTCHA\u201d. Google Security Blog. https:\/\/security.googleblog.com\/2014\/12\/are-you-robot-introducing-no-captcha.html  Google Security Blog [n.d.]. Are you a robot? Introducing \u201cNo CAPTCHA reCAPTCHA\u201d. Google Security Blog. https:\/\/security.googleblog.com\/2014\/12\/are-you-robot-introducing-no-captcha.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Google Security Blog [n.d.]. Introducing reCAPTCHA v3. Google Security Blog. https:\/\/security.googleblog.com\/2018\/10\/introducing-recaptcha-v3-new-way-to.html  Google Security Blog [n.d.]. Introducing reCAPTCHA v3. Google Security Blog. https:\/\/security.googleblog.com\/2018\/10\/introducing-recaptcha-v3-new-way-to.html"},{"key":"e_1_3_2_1_3_1","unstructured":"Symantec [n.d.]. IP Spoofing: An Introduction. Symantec. https:\/\/www.symantec.com\/connect\/articles\/ip-spoofing-introduction  Symantec [n.d.]. IP Spoofing: An Introduction. Symantec. https:\/\/www.symantec.com\/connect\/articles\/ip-spoofing-introduction"},{"key":"e_1_3_2_1_4_1","unstructured":"prowebscraper [n.d.]. Top 10 Captcha Solving Services Compared. prowebscraper. https:\/\/www.prowebscraper.com\/blog\/top-10-captcha-solving-services-compared\/  prowebscraper [n.d.]. Top 10 Captcha Solving Services Compared. prowebscraper. https:\/\/www.prowebscraper.com\/blog\/top-10-captcha-solving-services-compared\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2CAPTCHA [n.d.]. Website 2CAPTCHA. 2CAPTCHA. https:\/\/2captcha.com\/  2CAPTCHA [n.d.]. Website 2CAPTCHA. 2CAPTCHA. https:\/\/2captcha.com\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064340.1064341"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2010.114"},{"key":"e_1_3_2_1_8_1","volume-title":"Trustworthy Group Making Algorithm in Distributed Systems. Human-centric Computing and Information Sciences 1, 1 (22 11","author":"Aikebaier Ailixier","year":"2011","unstructured":"Ailixier Aikebaier , Tomoya Enokido , and Makoto Takizawa . 2011. Trustworthy Group Making Algorithm in Distributed Systems. Human-centric Computing and Information Sciences 1, 1 (22 11 2011 ), 6. Ailixier Aikebaier, Tomoya Enokido, and Makoto Takizawa. 2011. Trustworthy Group Making Algorithm in Distributed Systems. Human-centric Computing and Information Sciences 1, 1 (22 11 2011), 6."},{"key":"e_1_3_2_1_9_1","unstructured":"Isra\u00a0Mohamed Ali Maurantonio Caprolu and Roberto Di\u00a0Pietro. 2019. Foundations Properties and Security Applications of Puzzles: A Survey. arXiv preprint arXiv:1904.10164(2019).  Isra\u00a0Mohamed Ali Maurantonio Caprolu and Roberto Di\u00a0Pietro. 2019. Foundations Properties and Security Applications of Puzzles: A Survey. arXiv preprint arXiv:1904.10164(2019)."},{"key":"e_1_3_2_1_10_1","unstructured":"Nitish Balachandran and Sugata Sanyal. 2012. A review of techniques to mitigate sybil attacks. arXiv preprint arXiv:1207.2617(2012).  Nitish Balachandran and Sugata Sanyal. 2012. A review of techniques to mitigate sybil attacks. arXiv preprint arXiv:1207.2617(2012)."},{"volume-title":"Time-lock puzzles from randomized encodings","author":"Bitansky Nir","key":"e_1_3_2_1_11_1","unstructured":"Nir Bitansky , Shafi Goldwasser , Abhishek Jain , Omer Paneth , Vinod Vaikuntanathan , and Brent Waters . 2016. Time-lock puzzles from randomized encodings . Association for Computing Machinery . Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters. 2016. Time-lock puzzles from randomized encodings. Association for Computing Machinery."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2006.10"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2017.13"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16949-6_15"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_15"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINAW.2007.53"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866346"},{"volume-title":"NDSS.","author":"Danezis George","key":"e_1_3_2_1_20_1","unstructured":"George Danezis and Prateek Mittal . 2009. SybilInfer: Detecting Sybil Nodes using Social Networks .. In NDSS. San Diego, CA , 1\u201315. George Danezis and Prateek Mittal. 2009. SybilInfer: Detecting Sybil Nodes using Social Networks.. In NDSS. San Diego, CA, 1\u201315."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 10th conference on USENIX Security Symposium-Volume 10","author":"Dean Drew","year":"2001","unstructured":"Drew Dean and Adam Stubblefield . 2001 . Using client puzzles to protect TLS . In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10 . USENIX Association, 1. Drew Dean and Adam Stubblefield. 2001. Using client puzzles to protect TLS. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. USENIX Association, 1."},{"key":"e_1_3_2_1_22_1","volume-title":"The Sybil Attack. In International workshop on peer-to-peer systems, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer Berlin Heidelberg","author":"Douceur R.","year":"2002","unstructured":"John\u00a0 R. Douceur . 2002 . The Sybil Attack. In International workshop on peer-to-peer systems, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 251\u2013260. John\u00a0R. Douceur. 2002. The Sybil Attack. In International workshop on peer-to-peer systems, Peter Druschel, Frans Kaashoek, and Antony Rowstron (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 251\u2013260."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_25"},{"key":"e_1_3_2_1_24_1","volume-title":"Annual International Cryptology Conference. Springer, 139\u2013147","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor . 1992 . Pricing via processing or combatting junk mail . In Annual International Cryptology Conference. Springer, 139\u2013147 . Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference. Springer, 139\u2013147."},{"volume-title":"Proceedings of the 9th ACM conference on Computer and communications security. ACM, 193\u2013206","author":"J.","key":"e_1_3_2_1_25_1","unstructured":"Michael\u00a0 J. Freedman and Robert Morris. 2002. Tarzan: A peer-to-peer anonymizing network layer . In Proceedings of the 9th ACM conference on Computer and communications security. ACM, 193\u2013206 . Michael\u00a0J. Freedman and Robert Morris. 2002. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the 9th ACM conference on Computer and communications security. ACM, 193\u2013206."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.27"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNS.2015.7292385"},{"volume-title":"European Symposium on Research in Computer Security. Springer, 679\u2013697","author":"O.","key":"e_1_3_2_1_28_1","unstructured":"Ghassan\u00a0 O. Karame and Srdjan \u010capkun. 2010. Low-cost client puzzles based on modular exponentiation . In European Symposium on Research in Computer Security. Springer, 679\u2013697 . Ghassan\u00a0O. Karame and Srdjan \u010capkun. 2010. Low-cost client puzzles based on modular exponentiation. In European Symposium on Research in Computer Security. Springer, 679\u2013697."},{"key":"e_1_3_2_1_29_1","first-page":"6341","article-title":"CAPTCHA and its techniques: a review","volume":"5","author":"Kaur Kiranjot","year":"2014","unstructured":"Kiranjot Kaur and Sunny Behal . 2014 . CAPTCHA and its techniques: a review . International Journal of Computer Science and Information Technologies 5 , 5(2014), 6341 \u2013 6344 . Kiranjot Kaur and Sunny Behal. 2014. CAPTCHA and its techniques: a review. International Journal of Computer Science and Information Technologies 5, 5(2014), 6341\u20136344.","journal-title":"International Journal of Computer Science and Information Technologies"},{"volume-title":"Information and Communications Security","author":"Kopp Henning","key":"e_1_3_2_1_30_1","unstructured":"Henning Kopp , Frank Kargl , Christoph B\u00f6sch , and Andreas Peter . 2018. uMine: A Blockchain Based on Human Miners . In Information and Communications Security . Springer International Publishing , Cham , 20\u201338. Henning Kopp, Frank Kargl, Christoph B\u00f6sch, and Andreas Peter. 2018. uMine: A Blockchain Based on Human Miners. In Information and Communications Security. Springer International Publishing, Cham, 20\u201338."},{"key":"e_1_3_2_1_31_1","first-page":"224","article-title":"A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst","volume":"7","author":"Levine Brian\u00a0Neil","year":"2006","unstructured":"Brian\u00a0Neil Levine , Clay Shields , and N.\u00a0 Boris Margolin . 2006 . A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst , MA 7 (2006), 224 . Brian\u00a0Neil Levine, Clay Shields, and N.\u00a0Boris Margolin. 2006. A survey of solutions to the sybil attack. University of Massachusetts Amherst, Amherst, MA 7 (2006), 224.","journal-title":"MA"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382548"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_3"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422479"},{"key":"e_1_3_2_1_35_1","volume-title":"Informant: Detecting Sybils using Incentives. In Int. Conf. on Financial Cryptography and Data Security","author":"Margolin Boris","year":"2007","unstructured":"N.\u00a0 Boris Margolin and Brian\u00a0Neil Levine . 2007 . Informant: Detecting Sybils using Incentives. In Int. Conf. on Financial Cryptography and Data Security . Springer , 192\u2013207. N.\u00a0Boris Margolin and Brian\u00a0Neil Levine. 2007. Informant: Detecting Sybils using Incentives. In Int. Conf. on Financial Cryptography and Data Security. Springer, 192\u2013207."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. of the 38th IEEE Int. Conf. on Distributed Computing Systems (ICDCS)","author":"M\u00f6dinger David","year":"2018","unstructured":"David M\u00f6dinger , Henning Kopp , Frank Kargl , and Franz\u00a0 J. Hauck . 2018 . Towards Enhanced Network Privacy for Blockchains . In Proc. of the 38th IEEE Int. Conf. on Distributed Computing Systems (ICDCS) ( Vienna, Austria). David M\u00f6dinger, Henning Kopp, Frank Kargl, and Franz\u00a0J. Hauck. 2018. Towards Enhanced Network Privacy for Blockchains. In Proc. of the 38th IEEE Int. Conf. on Distributed Computing Systems (ICDCS) (Vienna, Austria)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1157"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718479"},{"key":"e_1_3_2_1_40_1","volume-title":"10th Innovations in Theoretical Computer Science Conference, Vol.\u00a0124","author":"Pietrzak Z.","year":"2019","unstructured":"Krzysztof\u00a0 Z. Pietrzak . 2019 . Simple verifiable delay functions . In 10th Innovations in Theoretical Computer Science Conference, Vol.\u00a0124 . Krzysztof\u00a0Z. Pietrzak. 2019. Simple verifiable delay functions. In 10th Innovations in Theoretical Computer Science Conference, Vol.\u00a0124."},{"volume-title":"Time-lock puzzles and timed-release crypto","author":"Rivest L.","key":"e_1_3_2_1_41_1","unstructured":"Ronald\u00a0 L. Rivest , Adi Shamir , and David\u00a0 A. Wagner . 1996. Time-lock puzzles and timed-release crypto . Massachusetts Institute of Technology . Ronald\u00a0L. Rivest, Adi Shamir, and David\u00a0A. Wagner. 1996. Time-lock puzzles and timed-release crypto. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_42_1","volume-title":"arXiv e-prints (1","author":"Shi Chenghui","year":"2019","unstructured":"Chenghui Shi , Xiaogang Xu , Shouling Ji , Kai Bu , Jianhai Chen , Raheem Beyah , and Ting Wang . 2019. Adversarial CAPTCH As . arXiv e-prints (1 2019 ), 1 \u201316. arxiv:1901.01107 Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, and Ting Wang. 2019. Adversarial CAPTCHAs. arXiv e-prints (1 2019), 1 \u201316. arxiv:1901.01107"},{"key":"e_1_3_2_1_43_1","first-page":"2242","article-title":"Survey of different types of CAPTCHA","volume":"5","author":"Singh Ved\u00a0Prakash","year":"2014","unstructured":"Ved\u00a0Prakash Singh and Preet Pal . 2014 . Survey of different types of CAPTCHA . International Journal of Computer Science and Information Technologies 5 , 2(2014), 2242 \u2013 2245 . Ved\u00a0Prakash Singh and Preet Pal. 2014. Survey of different types of CAPTCHA. International Journal of Computer Science and Information Technologies 5, 2(2014), 2242\u20132245.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466685"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76969-9_16"},{"key":"e_1_3_2_1_46_1","volume-title":"Irfan Essa, and Wenke Lee.","author":"Uzun Erkam","year":"2018","unstructured":"Erkam Uzun , Simon Pak\u00a0Ho Chung , Irfan Essa, and Wenke Lee. 2018 . rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.. In NDSS. Erkam Uzun, Simon Pak\u00a0Ho Chung, Irfan Essa, and Wenke Lee. 2018. rtCaptcha: A Real-Time CAPTCHA Based Liveness Detection System.. In NDSS."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/966389.966390"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948128"},{"key":"e_1_3_2_1_50_1","volume-title":"reCAPTCHA: Human-based character recognition via web security measures. Science 321, 5895","author":"Von\u00a0Ahn Luis","year":"2008","unstructured":"Luis Von\u00a0Ahn , Benjamin Maurer , Colin McMillen , David Abraham , and Manuel Blum . 2008. reCAPTCHA: Human-based character recognition via web security measures. Science 321, 5895 ( 2008 ), 1465\u20131468. Luis Von\u00a0Ahn, Benjamin Maurer, Colin McMillen, David Abraham, and Manuel Blum. 2008. reCAPTCHA: Human-based character recognition via web security measures. Science 321, 5895 (2008), 1465\u20131468."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2018.8461764"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"},{"key":"e_1_3_2_1_54_1","volume-title":"SybilGuard: Defending against Sybil Attacks via Social Networks","author":"Yu Haifeng","year":"2008","unstructured":"Haifeng Yu , Michael Kaminsky , Phillip\u00a0 B. Gibbons , and Abraham\u00a0 D. Flaxman . 2008. SybilGuard: Defending against Sybil Attacks via Social Networks . IEEE\/ACM Transactions on networking 16, 3 ( 2008 ), 576\u2013589. Haifeng Yu, Michael Kaminsky, Phillip\u00a0B. Gibbons, and Abraham\u00a0D. Flaxman. 2008. SybilGuard: Defending against Sybil Attacks via Social Networks. IEEE\/ACM Transactions on networking 16, 3 (2008), 576\u2013589."},{"key":"e_1_3_2_1_55_1","volume-title":"Effect of Adversarial Examples on the Robustness of CAPTCHA. In 2018 Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 1\u2013109","author":"Zhang Yang","year":"2018","unstructured":"Yang Zhang , Haichang Gao , Ge Pei , Shuai Kang , and Xin Zhou . 2018 . Effect of Adversarial Examples on the Robustness of CAPTCHA. In 2018 Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 1\u2013109 . Yang Zhang, Haichang Gao, Ge Pei, Shuai Kang, and Xin Zhou. 2018. Effect of Adversarial Examples on the Robustness of CAPTCHA. In 2018 Int. Conf. on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 1\u2013109."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270101.3270104"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/3280489.3280510"}],"event":{"name":"ICNCC 2020: 2020 The 9th International Conference on Networks, Communication and Computing","acronym":"ICNCC 2020","location":"Tokyo Japan"},"container-title":["2020 The 9th International Conference on Networks, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447671","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447654.3447671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:10Z","timestamp":1750200070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447654.3447671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,18]]},"references-count":57,"alternative-id":["10.1145\/3447654.3447671","10.1145\/3447654"],"URL":"https:\/\/doi.org\/10.1145\/3447654.3447671","relation":{},"subject":[],"published":{"date-parts":[[2020,12,18]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}