Research on the Security of Visual Reasoning CAPTCHA | 0 | 0.34 | 2021 |
SonarSnoop: active acoustic side-channel attacks | 0 | 0.34 | 2020 |
Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants | 0 | 0.34 | 2019 |
A Security Analysis of Honeywords. | 1 | 0.35 | 2018 |
Towards Reactive Acoustic Jamming for Personal Voice Assistants. | 0 | 0.34 | 2018 |
POSTER: Who was Behind the Camera? - Towards Some New Forensics. | 0 | 0.34 | 2017 |
A Dual-Axis Mems Vibratory Gyroscope Asic With 0.0061 Degrees/S/Root Hz Noise Floor Over 480 Hz Bandwidth | 0 | 0.34 | 2017 |
The Science and Detection of Tilting. | 0 | 0.34 | 2016 |
Targeted Online Password Guessing: An Underestimated Threat. | 44 | 1.24 | 2016 |
A Simple Generic Attack on Text Captchas. | 6 | 0.43 | 2016 |
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat? | 0 | 0.34 | 2016 |
Failures of Security APIs: A New Case. | 0 | 0.34 | 2016 |
Novel Security and Privacy Perspectives of Camera Fingerprints (Transcript of Discussion). | 0 | 0.34 | 2016 |
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat? | 0 | 0.34 | 2016 |
Novel Security and Privacy Perspectives of Camera Fingerprints. | 0 | 0.34 | 2016 |
A security analysis of automated chinese turing tests. | 1 | 0.34 | 2016 |
Enhancing Sensor Pattern Noise for Source Camera Identification: An Empirical Evaluation | 1 | 0.36 | 2015 |
Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems | 4 | 0.40 | 2014 |
Security Analyses of Click-based Graphical Passwords via Image Point Memorability | 4 | 0.40 | 2014 |
The robustness of hollow CAPTCHAs | 11 | 0.52 | 2013 |
Towards New Security Primitives Based on Hard AI Problems (Transcript of Discussion). | 0 | 0.34 | 2013 |
Towards New Security Primitives Based on Hard AI Problems. | 0 | 0.34 | 2013 |
Security implications of password discretization for click-based graphical passwords | 2 | 0.36 | 2013 |
Aimbot detection in online FPS games using a heuristic method based on distribution comparison matrix | 1 | 0.37 | 2012 |
A statistical aimbot detection method for online FPS games | 2 | 0.42 | 2012 |
CAPTCHA Design: Color, Usability, and Security | 7 | 0.47 | 2012 |
Shoulder surfing defence for recall-based graphical passwords | 47 | 1.50 | 2011 |
System Security Research at Newcastle | 0 | 0.34 | 2011 |
Captcha Robustness: A Security Engineering Perspective | 12 | 0.54 | 2011 |
The robustness of a new CAPTCHA | 23 | 0.84 | 2010 |
Attacks and design of image recognition CAPTCHAs | 63 | 1.72 | 2010 |
Security Design in Human Computation Games. | 0 | 0.34 | 2010 |
Magic Bullet: a dual-purpose computer game | 3 | 0.44 | 2009 |
An Investigation of Cheating in Online Games | 9 | 0.89 | 2009 |
CAPTCHA Security: A Case Study | 11 | 0.54 | 2009 |
Streamlining attacks on CAPTCHAs with a computer game | 4 | 0.55 | 2009 |
A low-cost attack on a Microsoft captcha | 141 | 6.60 | 2008 |
Usability of CAPTCHAs or usability issues in CAPTCHA design | 123 | 5.49 | 2008 |
Do background images improve "draw a secret" graphical passwords? | 70 | 3.45 | 2007 |
Graphical passwords & qualitative spatial relations | 12 | 0.96 | 2007 |
Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms | 89 | 4.30 | 2007 |
Is FacePIN secure and usable? | 7 | 0.72 | 2007 |
Bot, Cyborg and Automated Turing Test | 8 | 1.49 | 2006 |
Detecting Cheaters For Multiplayer Games: Theory, Design And Implementation [1] | 22 | 2.40 | 2006 |
Enhancing Collaborative Spam Detection with Bloom Filters | 3 | 0.46 | 2006 |
A systematic classification of cheating in online games | 68 | 4.57 | 2005 |
Security Design in Online Games | 27 | 2.95 | 2003 |
Security Issues In Online Games | 12 | 4.26 | 2002 |
A note on proactive password checking | 38 | 8.01 | 2001 |