{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:01:51Z","timestamp":1725559311588},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540266563"},{"type":"electronic","value":"9783540316800"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11507840_21","type":"book-chapter","created":{"date-parts":[[2010,7,15]],"date-time":"2010-07-15T12:35:59Z","timestamp":1279197359000},"page":"225-239","source":"Crossref","is-referenced-by-count":3,"title":["A User-Friendly Approach to Human Authentication of Messages"],"prefix":"10.1007","author":[{"given":"Jeff","family":"King","sequence":"first","affiliation":[]},{"given":"Andre","family":"dos Santos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Kochanski, G., Lopresti, D., Shih, C.: A reverse turing test using speech. In: Proceedings of the International Conferences on Spoken Language Processing, Denver, Colorado, pp. 1357\u20131360 (2002)","DOI":"10.21437\/ICSLP.2002-412"},{"key":"21_CR3","unstructured":"Gobioff, H., Smith, S., Tygar, J.D., Yee, B.: Smart cards in hostile environments. In: Proceedings of the Second USENIX Workshop on Electronic Commerce (1996)"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024, 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/3-540-61996-8_42","volume-title":"Information Hiding","author":"J.R. Smith","year":"1996","unstructured":"Smith, J.R., Comiskey, B.O.: Modulation and information hiding in images. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 207\u2013226. Springer, Heidelberg (1996)"},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-49380-8_19","volume-title":"Information Hiding","author":"N.F. Johnson","year":"1998","unstructured":"Johnson, N.F., Jajodia, S.: Steganalysis of images created using current steganography software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 273\u2013289. Springer, Heidelberg (1998)"},{"key":"21_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/238168.238190","volume-title":"Proceedings of the 3rd ACM conference on Computer and communications security","author":"T. Matsumoto","year":"1996","unstructured":"Matsumoto, T.: Human-computer cryptography: an attempt. In: Proceedings of the 3rd ACM conference on Computer and communications security, pp. 68\u201375. ACM Press, New York (1996)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1007\/BFb0052245","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"M. Naor","year":"1997","unstructured":"Naor, M., Pinkas, B.: Visual authentication and identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 322\u2013336. Springer, Heidelberg (1997)"},{"key":"21_CR10","unstructured":"Stabell-Kul\u00f8, T., Arild, R., Myrvang, P.H.: Providing authentication to messages signed with a smart card in hostile environments. In: USENIX Workshop on Smartcard Technology (May 1999)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11507840_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T03:19:51Z","timestamp":1685675991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11507840_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540266563","9783540316800"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11507840_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}