This paper explores ways in which Human Interactive Proofs (HIPs), i.e. problems which are easy for humans to solve but are intractable for computers, can be used to improve the security of human-machine interactions. The particular focus of this paper is the case where these interactions take place via an untrusted intermediary device, and where the use of HIPs can be used to establish a secure channel between the human and target machine. A number of application scenarios of this general type are considered, and in each case the possible use of HIPs to improve interaction security is explored. © 2009 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Mitchell, C. J. (2009). Using human interactive proofs to secure human-machine interactions via untrusted intermediaries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5087 LNCS, pp. 164–170). https://doi.org/10.1007/978-3-642-04904-0_22
Mendeley helps you to discover research relevant for your work.