{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T09:58:45Z","timestamp":1771667925857,"version":"3.50.1"},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NLnet Foundation, Netherlands"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:p>To counter the threat of AI-powered bots, captcha systems are growing increasingly complex, often sacrificing usability and accessibility. Can mCaptcha, a proof-of-work captcha system, effectively address these issues?<\/jats:p>","DOI":"10.1145\/3660628","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T02:56:11Z","timestamp":1727319371000},"page":"70-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility"],"prefix":"10.1145","volume":"67","author":[{"given":"Aravinth","family":"Manivannan","sequence":"first","affiliation":[{"name":"VIT-AP Campus, Computer Science and Engineering, Amaravati, Andhra Pradesh, India"}]},{"given":"Sibi Chakkaravarthy","family":"Sethuraman","sequence":"additional","affiliation":[{"name":"VIT-AP Campus, Computer Science, Amaravati, Andhra Pradesh, India"}]},{"given":"Devi Priya","family":"Vimala Sudhakaran","sequence":"additional","affiliation":[{"name":"VIT-AP Campus, Computer Science and Engineering, Amaravati, Andhra Pradesh, India"}]}],"member":"320","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.08.109"},{"key":"e_1_3_1_3_2","unstructured":"Toulas B. Researchers develop CAPTCHA solver to aid dark web research. Bleepingcomputer (Jan. 14 2022); https:\/\/www.bleepingcomputer.com\/news\/security\/researchers-develop-captcha-solver-to-aid-dark-web-research."},{"key":"e_1_3_1_4_2","unstructured":"Abrams L. Malware campaign uses clever \u2018captcha\u2019 to bypass browser warning. Bleepingcomputer (Aug. 17 2021); https:\/\/www.bleepingcomputer.com\/news\/security\/malware-campaign-uses-clever-captcha-to-bypass-browser-warning."},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1275-9_31"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.37"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106700"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.229"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477142"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09608-4"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833753"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2945682"},{"issue":"2","key":"e_1_3_1_13_2","first-page":"7","article-title":"Web applications protection from automated attacks by the reCAPTCHA API","volume":"5","author":"Veli\u010dkovi\u0107 Z.","year":"2020","unstructured":"Veli\u010dkovi\u0107, Z. and Milivojevi\u0107, Z. Web applications protection from automated attacks by the reCAPTCHA API. J. of Mechatronics, Automation and Identifi. Tech. 5, 2 (2020), 7\u201311.","journal-title":"J. of Mechatronics, Automation and Identifi. Tech."},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417245"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3396374"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53644-5_20"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00061"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Le T. Dua A. and Feng W.-C. Kapow plugins: Protecting web applications using reputation-based proof-of-work. In. Proc. of the 2nd Joint WICOW\/AIRWeb Workshop on Web Quality. 2012 60\u201363.","DOI":"10.1145\/2184305.2184318"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Yegenian A. and Dimitriou T. Inexpensive email addresses an email spam-combating system. In Security and Privacy in Communication Networks: 6th Iternatl. ICST Conf: Proceedings 6. Springer 2010 35\u201352.","DOI":"10.1007\/978-3-642-16161-2_3"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102506"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.23.814"},{"issue":"1","key":"e_1_3_1_23_2","first-page":"508","article-title":"A brief review on text and image CAPTCHA","volume":"11","author":"Sasmal M.","year":"2020","unstructured":"Sasmal, M. et al. A brief review on text and image CAPTCHA. Turkish J. of Comp. and Mathema Educa (TURCOMAT). 11, 1 (2020), 508\u2013526.","journal-title":"Turkish J. of Comp. and Mathema Educa (TURCOMAT)"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Chow Y.-W. Susilo W. and Thorncharoensri P. CAPTCHA design and security issues. Advances in Cyber Secu.: Princi. Techni. and Appli. (2019) 69\u201392.","DOI":"10.1007\/978-981-13-1483-4_4"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3559754"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.004"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2014.31"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584974"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS51430.2021.9441737"},{"key":"e_1_3_1_30_2","article-title":"Deep-CAPTCHA: A deep learning based CAPTCHA solver for vulnerability assessment","author":"Noury Z.","year":"2020","unstructured":"Noury, Z. and Rezaei, M. Deep-CAPTCHA: A deep learning based CAPTCHA solver for vulnerability assessment. arXiv preprint arXiv:2006.08296 (2020).","journal-title":"arXiv preprint arXiv:2006.08296"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00138-020-01119-9"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2019.07.004"},{"issue":"5","key":"e_1_3_1_33_2","first-page":"431","article-title":"An investigation on adaptive HTTP media streaming quality-of-experience (QOE) and agility using cloud media services","volume":"43","author":"Kesavan S.","year":"2021","unstructured":"Kesavan, S., Saravana Kumar, E., Kumar, A., and Vengatesan, K. An investigation on adaptive HTTP media streaming quality-of-experience (QOE) and agility using cloud media services. Intl. J. Comp. and Appli. 43, 5 (2021), 431\u2013444.","journal-title":"Intl. J. Comp. and Appli."},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2019.12.001"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3113039"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/SysCoBIoTS48768.2019.9028012"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204812"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/AICAI.2019.8701327"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3660628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:21Z","timestamp":1750287021000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3660628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":37,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["10.1145\/3660628"],"URL":"https:\/\/doi.org\/10.1145\/3660628","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,26]]},"assertion":[{"value":"2023-11-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}