Works matching DE "CAPTCHA (Challenge-response test)"
1
- Government Technology, 2014, v. 27, n. 8, p. 50
- Article
2
- IEEE Internet Computing, 2012, v. 16, n. 2, p. 44, doi. 10.1109/MIC.2011.102
- El Ahmad, Ahmad Salah;
- Yan, Jeff;
- Ng, Wai-Yin
- Article
3
- Journal of Research & Practice in Information Technology, 2012, v. 44, n. 4, p. 441
- Chatpong Tangmanee;
- Paradorn Sujarit-apirak
- Article
4
- Mind (0026-4423), 1990, v. 99, n. 393, p. 53, doi. 10.1093/mind/XCIX.393.53
- Article
5
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 7, p. 1027, doi. 10.26483/ijarcs.v8i7.4566
- Article
6
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 133
- Kanimozhi, R.;
- Jagadeesan, D.
- Article
7
- Braille Monitor, 2014, v. 57, n. 6, p. 429
- Article
8
- IUP Journal of Systems Management, 2011, v. 9, n. 4, p. 20
- Article
9
- AI Magazine, 2016, v. 37, n. 1, p. 78, doi. 10.1609/aimag.v37i1.2643
- Adams, Sam S.;
- Banavar, Guruduth;
- Campbell, Murray
- Article
10
- PLoS ONE, 2014, v. 9, n. 4, p. 1, doi. 10.1371/journal.pone.0091708
- Goswami, Gaurav;
- Powell, Brian M.;
- Vatsa, Mayank;
- Singh, Richa;
- Noore, Afzel
- Article
11
- PLoS ONE, 2012, v. 7, n. 3, p. 1, doi. 10.1371/journal.pone.0032121
- Hannagan, Thomas;
- Ktori, Maria;
- Chanceaux, Myriam;
- Grainger, Jonathan
- Article
12
- M/C Journal, 2020, v. 23, n. 6, p. N.PAG, doi. 10.5204/mcj.2726
- Article
13
- Computer Systems Science & Engineering, 2022, v. 40, n. 2, p. 421, doi. 10.32604/csse.2022.018929
- Alsuhibany, Suliman A.;
- Alquraishi, Meznah
- Article
14
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 2, p. 97, doi. 10.1049/ise2.12047
- Nian, Jiawei;
- Wang, Ping;
- Gao, Haichang;
- Guo, Xiaoyan
- Article
15
- IETE Technical Review, 2018, v. 35, p. 106, doi. 10.1080/02564602.2018.1520152
- Chen, Jun;
- Luo, Xiangyang;
- Hu, Jianwei;
- Ye, Dengpan;
- Gong, Daofu
- Article
16
- ISeCure, 2009, v. 1, n. 2, p. 69
- Article
17
- ISeCure, 2009, v. 1, n. 2, p. 105
- Banday, M. Tariq;
- Shah, Nisar A.
- Article
18
- Computers, Materials & Continua, 2019, v. 58, n. 3, p. 665, doi. 10.32604/cmc.2019.05683
- Wentao Ma;
- Jiaohua Qin;
- Xuyu Xiang;
- Yun Tan;
- Yuanjing Luo;
- Xiong, Neal N.
- Article
19
- International Journal of Human-Computer Interaction, 2015, v. 31, n. 7, p. 457, doi. 10.1080/10447318.2015.1038124
- Leiva, Luis A.;
- Álvaro, Francisco
- Article
20
- IEEE Transactions on Dependable & Secure Computing, 2014, v. 11, n. 5, p. 480, doi. 10.1109/TDSC.2013.52
- Xu, Yi;
- Reynaga, Gerardo;
- Chiasson, Sonia;
- Frahm, Jan-Michael;
- Monrose, Fabian;
- van Oorschot, Paul C.
- Article
21
- Multimedia Systems, 2018, v. 24, n. 6, p. 625, doi. 10.1007/s00530-018-0589-6
- Brodić, Darko;
- Amelio, Alessia
- Article
22
- ISRN Artificial Intelligence, 2012, v. 2012, p. 1, doi. 10.5402/2012/271878
- Article
23
- Information Technologist, 2018, v. 15, n. 1, p. 263
- Omotayo, Funmilola Olubunmi
- Article
24
- In Practice (0263841X), 2013, v. 35, n. 2, p. 104, doi. 10.1136/inp.f157
- Article
25
- Computer Science & Telecommunications, 2013, v. 40, n. 4, p. 16
- Shouket Ahmad Kouchay;
- Aljumah, Abdullah;
- Ahmad, Yasir
- Article
26
- Issues in Informing Science & Information Technology, 2016, v. 13, p. 63, doi. 10.28945/3468
- Article
27
- Multimedia Tools & Applications, 2018, v. 77, n. 10, p. 12293, doi. 10.1007/s11042-017-4883-7
- Brodić, Darko;
- Amelio, Alessia;
- Janković, Radmila
- Article
28
- Multimedia Tools & Applications, 2017, v. 76, n. 24, p. 25547, doi. 10.1007/s11042-016-4151-2
- Hussain, Rafaqat;
- Gao, Hui;
- Shaikh, Riaz
- Article
29
- Multimedia Tools & Applications, 2015, v. 74, n. 14, p. 5141, doi. 10.1007/s11042-013-1666-7
- Yang, Tzu-I;
- Koong, Chorng-Shiuh;
- Tseng, Chien-Chao
- Article
30
- Multimedia Tools & Applications, 2015, v. 74, n. 13, p. 4583, doi. 10.1007/s11042-013-1823-z
- Article
31
- Multimedia Tools & Applications, 2014, v. 72, n. 2, p. 1215, doi. 10.1007/s11042-013-1422-z
- Kim, Jonghak;
- Kim, Sangtae;
- Yang, Joonhyuk;
- Ryu, Jung-hee;
- Wohn, KwangYun
- Article
32
- Multimedia Tools & Applications, 2010, v. 48, n. 2, p. 267, doi. 10.1007/s11042-009-0341-5
- Shih-Yu Huang;
- Yeuan-Kuen Lee;
- Graeme Bell;
- Zhan-he Ou
- Article
33
- Journal of Information Science & Engineering, 2014, v. 30, n. 2, p. 347
- HAICHANG GAO;
- WEI WANG;
- YE FAN;
- JIAO QI;
- XIYANG LIU
- Article
34
- AARMS: Academic & Applied Research in Military & Public Management Science, 2014, v. 13, n. 1, p. 209, doi. 10.32565/aarms.2014.1.18
- SZTUKA, Jirí;
- HAGARA, Ladislav
- Article
36
- Journal of Multimedia, 2011, v. 6, n. 6, p. 526, doi. 10.4304/jmm.6.6.526-533
- Jingsong Cui;
- Lu Liu;
- Gang Du;
- Ying Wang;
- Qianqi Guan
- Article
37
- Internet Histories, 2021, v. 5, n. 1, p. 30, doi. 10.1080/24701475.2020.1831197
- Article
38
- International Journal of Smart Security Technologies (IJSST), 2022, v. 9, n. 1, p. 1, doi. 10.4018/IJSST.299038
- Sharma, Abhishek;
- Sharma, Shilpi;
- Gulati, Saksham
- Article
39
- i-Manager's Journal on Computer Science, 2018, v. 6, n. 3, p. 42, doi. 10.26634/jcom.6.3.15699
- OMOYELE, MOSES O.;
- OJENIYI, JOSEPH A.;
- ADEBAYO, OLAWALE S.
- Article
40
- Eastern-European Journal of Enterprise Technologies, 2018, v. 96, n. 2, p. 39, doi. 10.15587/1729-4061.2018.148307
- Myroniv, I.;
- Zhebka, V.;
- Ostapov, S.;
- Val, O.
- Article
41
- International Journal of Information Security, 2017, v. 16, n. 2, p. 133, doi. 10.1007/s10207-015-0311-z
- Mehrnezhad, Maryam;
- Ghaemi Bafghi, Abbas;
- Harati, Ahad;
- Toreini, Ehsan
- Article
42
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5934, doi. 10.1002/sec.1747
- Krishnamoorthy, Suresh Kumar;
- Thankappan, Sasikala
- Article
43
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3995, doi. 10.1002/sec.1316
- Nachar, Rabih Al.;
- Inaty, Elie;
- Bonnin, Patrick J.;
- Alayli, Yasser
- Article
44
- Security & Communication Networks, 2015, v. 8, n. 12, p. 2135, doi. 10.1002/sec.1157
- Moradi, Mohammad;
- Keyvanpour, MohammadReza
- Article
45
- Security & Communication Networks, 2014, v. 7, n. 8, p. 1199, doi. 10.1002/sec.825
- Ferraro Petrillo, Umberto;
- Mastroianni, Giovanni;
- Visconti, Ivan
- Article
46
- Security & Communication Networks, 2013, v. 6, n. 9, p. 1161, doi. 10.1002/sec.688
- Yeh, Her-Tyan;
- Chen, Bing-Chang;
- Wu, Yi-Cong
- Article
47
- Journal of Experimental & Theoretical Artificial Intelligence, 2015, v. 27, n. 2, p. 123, doi. 10.1080/0952813X.2014.921734
- Warwick, Kevin;
- Shah, Huma
- Article
48
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 3, p. 1071, doi. 10.3837/tiis.2014.03.021
- Jonghak Kim;
- Joonhyuk Yang;
- Kwangyun Wohn
- Article
49
- International Journal of Interactive Mobile Technologies, 2015, v. 9, n. 4, p. 64, doi. 10.3991/ijim.v9i4.4644
- Tsioliaridou, A. N.;
- Zhang, C.;
- Liaskos, C. K.
- Article
50
- International Review on Computers & Software, 2014, v. 9, n. 1, p. 110, doi. 10.15866/irecos.v9i1.1037
- Kumar, K. Suresh;
- Sasikala, T.
- Article