Edge computing security: State of the art and challenges

Y Xiao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

Embedded noninteractive continuous bot detection

RV Yampolskiy, V Govindaraju - Computers in Entertainment (CIE), 2008 - dl.acm.org
Multiplayer online computer games are quickly growing in popularity, with millions of players
logging in every day. While most play in accordance with the rules set up by the game …

Validated mutual authentication

ER Potter, PM Skirvin - US Patent 7,266,693, 2007 - Google Patents
BACKGROUND Individuals use netWorks such as the Internet to conduct business,
communicate With others, make purchases, per form online banking, pay bills, obtain …

System and methods for weak authentication data reinforcement

MC Lee - US Patent 8,266,682, 2012 - Google Patents
This document discusses, among other things, a system and methods for weak
authentication data reinforcement. In an example embodiment, authentication data is …

[图书][B] Evaluating the Usability and Security of a Video CAPTCHA

KA Kluever - 2008 - search.proquest.com
A CAPTCHA is a variation of the Turing test, in which a challenge is used to distinguish
humans from computers (" bots") on the internet. They are commonly used to prevent the …

Gotcha password hackers!

J Blocki, M Blum, A Datta - Proceedings of the 2013 ACM workshop on …, 2013 - dl.acm.org
We introduce GOTCHAs (Generating panOptic Turing Tests to Tell Computers and Humans
Apart) as a way of preventing automated offline dictionary attacks against user selected …

User authorization using an automated Turing Test

PE Foreman - US Patent 9,203,833, 2015 - Google Patents
Response Matches Key? the Automated Turing Test module from the user, a user response;
determining, by the Automated Turing Test mod ule, whether the user response matches the …

AI‐Complete CAPTCHAs as Zero Knowledge Proofs of Access to an Artificially Intelligent System

RV Yampolskiy - International Scholarly Research Notices, 2012 - Wiley Online Library
Experts predict that in the next 10 to 100 years scientists will succeed in creating human‐
level artificial general intelligence. While it is most likely that this task will be accomplished …

Bibliography of works done on CAPTCHA

S Shirali-Shahreza… - 2008 3rd International …, 2008 - ieeexplore.ieee.org
Nowadays, a great amount of information is circulated through the Internet. Some of them
exclusively belongs to a special group of users and requires protection and safeguarding …

Usable human authentication: A quantitative treatment

J Blocki - (Doctoral dissertation, PhD thesis, Carnegie Mellon …, 2014 - apps.dtic.mil
A typical computer user today manages passwords for many different online accounts. Users
struggle with this task--often forgetting their passwords or adopting insecure practices, such …