Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/ccs/ZhuYLYLXYC10
%A Zhu, Bin B.
%A Yan, Jeff
%A Li, Qiujie
%A Yang, Chao
%A Liu, Jia
%A Xu, Ning
%A Yi, Meng
%A Cai, Kaiwei
%B ACM Conference on Computer and Communications Security
%D 2010
%E Al-Shaer, Ehab
%E Keromytis, Angelos D.
%E Shmatikov, Vitaly
%I ACM
%K
%P 187-200
%T Attacks and design of image recognition CAPTCHAs.
%U http://dblp.uni-trier.de/db/conf/ccs/ccs2010.html#ZhuYLYLXYC10
%@ 978-1-4503-0245-6
@inproceedings{conf/ccs/ZhuYLYLXYC10,
added-at = {2023-12-14T15:17:35.000+0100},
author = {Zhu, Bin B. and Yan, Jeff and Li, Qiujie and Yang, Chao and Liu, Jia and Xu, Ning and Yi, Meng and Cai, Kaiwei},
biburl = {https://www.bibsonomy.org/bibtex/26c6ccbef24e6eef422eb6109c71a756f/admin},
booktitle = {ACM Conference on Computer and Communications Security},
crossref = {conf/ccs/2010},
editor = {Al-Shaer, Ehab and Keromytis, Angelos D. and Shmatikov, Vitaly},
ee = {https://doi.org/10.1145/1866307.1866329},
interhash = {e95b041b4b155f5ff44977827e8680cd},
intrahash = {6c6ccbef24e6eef422eb6109c71a756f},
isbn = {978-1-4503-0245-6},
keywords = {},
pages = {187-200},
publisher = {ACM},
timestamp = {2023-12-14T15:17:35.000+0100},
title = {Attacks and design of image recognition CAPTCHAs.},
url = {http://dblp.uni-trier.de/db/conf/ccs/ccs2010.html#ZhuYLYLXYC10},
year = 2010
}