<--- Back to Details
First PageDocument Content
Artificial intelligence / Alan Turing / Transaction authentication number / Challenge-response authentication / Turing test / Brute-force attack / HTTP cookie / Brute-force search / Virtual Network Computing / CAPTCHA / System software / Computing
Date: 2006-11-28 11:08:41
Artificial intelligence
Alan Turing
Transaction authentication number
Challenge-response authentication
Turing test
Brute-force attack
HTTP cookie
Brute-force search
Virtual Network Computing
CAPTCHA
System software
Computing

LNCSEnhanced CAPTCHAs: Using Animation to Tell Humans and Computers Apart

Add to Reading List

Source URL: www.fp6-noah.org

Download Document from Source Website

File Size: 641,92 KB

Share Document on Facebook

Similar Documents

Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

DocID: 1r4Lp - View Document

Computer access control / Computer security / Security / Cryptography / CAPTCHA / Password / Challengeresponse authentication / Transaction authentication number / Brute-force attack / Salt / Authentication / Password cracking

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1qRqP - View Document

Cryptography / Key management / Public-key cryptography / Internet Standards / Internet protocols / Domain Name System Security Extensions / Key / Brute-force attack / Cryptanalysis / Domain Name System / Encryption / Entropy

DNSSEC Key Maintenance Analysis_final

DocID: 1qEU7 - View Document

Computer network security / NT LAN Manager / Kerberos / Integrated Windows Authentication / Authentication protocol / Challengeresponse authentication / Password / Cain and Abel / Key distribution center / Electronic authentication / Brute-force attack / Pass the hash

Mitigating Service Account Credential Theft on Windows Reducing the risk of automated authentication against untrusted endpoints VersionLast Updated:

DocID: 1pG6u - View Document

Computing / Concurrent computing / Parallel computing / GPGPU / Computer architecture / Video cards / Graphics hardware / Cryptography / Key derivation function / Scrypt / Brute-force attack / Password cracking

Security of Key Derivation Functions Ewerton Rodrigues Andrade Advisor: Prof. Dr. Marcos Antonio Simplicio Junior ยด

DocID: 1nnoz - View Document