Standard
Towards new security primitives based on hard AI problems. / Zhu, Bin B.
; Yan, Jeff.
Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. ed. / Bruce Christianson; James Malcolm; Frank Stajano; Jonathan Anderson; Joseph Bonneau. Berlin: Springer Verlag, 2013. p. 3-10 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8263).
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Harvard
Zhu, BB
& Yan, J 2013,
Towards new security primitives based on hard AI problems. in B Christianson, J Malcolm, F Stajano, J Anderson & J Bonneau (eds),
Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 8263, Springer Verlag, Berlin, pp. 3-10, 21st International Workshop on Security Protocols XXI, Cambridge, United Kingdom,
19/03/13.
https://doi.org/10.1007/978-3-642-41717-7_2
APA
Zhu, B. B.
, & Yan, J. (2013).
Towards new security primitives based on hard AI problems. In B. Christianson, J. Malcolm, F. Stajano, J. Anderson, & J. Bonneau (Eds.),
Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers (pp. 3-10). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8263). Springer Verlag.
https://doi.org/10.1007/978-3-642-41717-7_2
Vancouver
Zhu BB
, Yan J.
Towards new security primitives based on hard AI problems. In Christianson B, Malcolm J, Stajano F, Anderson J, Bonneau J, editors, Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Berlin: Springer Verlag. 2013. p. 3-10. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-642-41717-7_2
Author
Zhu, Bin B.
; Yan, Jeff. /
Towards new security primitives based on hard AI problems. Security Protocols XXI: 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. editor / Bruce Christianson ; James Malcolm ; Frank Stajano ; Jonathan Anderson ; Joseph Bonneau. Berlin : Springer Verlag, 2013. pp. 3-10 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Bibtex
@inproceedings{67cc5a0e789a4bcf9966d1a1a41fbf26,
title = "Towards new security primitives based on hard AI problems",
abstract = "Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems.",
keywords = "Captcha as gRaphical passwords (CaRP), Cross-device authentication, Passwords",
author = "Zhu, {Bin B.} and Jeff Yan",
year = "2013",
doi = "10.1007/978-3-642-41717-7_2",
language = "English",
isbn = "9783642417160",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "3--10",
editor = "Bruce Christianson and James Malcolm and Frank Stajano and Jonathan Anderson and Joseph Bonneau",
booktitle = "Security Protocols XXI",
note = "21st International Workshop on Security Protocols XXI ; Conference date: 19-03-2013 Through 20-03-2013",
}
RIS
TY - GEN
T1 - Towards new security primitives based on hard AI problems
AU - Zhu, Bin B.
AU - Yan, Jeff
PY - 2013
Y1 - 2013
N2 - Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems.
AB - Many security primitives are based on hard mathematical problems. Using hard AI problems for security has emerged as an exciting new paradigm (with Captcha being the most successful example). However, this paradigm has achieved just a limited success, and has been under-explored. In this paper, we motivate and sketch a new security primitive based on hard AI problems.
KW - Captcha as gRaphical passwords (CaRP)
KW - Cross-device authentication
KW - Passwords
U2 - 10.1007/978-3-642-41717-7_2
DO - 10.1007/978-3-642-41717-7_2
M3 - Conference contribution/Paper
AN - SCOPUS:84893396282
SN - 9783642417160
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 3
EP - 10
BT - Security Protocols XXI
A2 - Christianson, Bruce
A2 - Malcolm, James
A2 - Stajano, Frank
A2 - Anderson, Jonathan
A2 - Bonneau, Joseph
PB - Springer Verlag
CY - Berlin
T2 - 21st International Workshop on Security Protocols XXI
Y2 - 19 March 2013 through 20 March 2013
ER -