Using human interactive proofs to secure human-machine interactions via untrusted intermediaries

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper explores ways in which Human Interactive Proofs (HIPs), i.e. problems which are easy for humans to solve but are intractable for computers, can be used to improve the security of human-machine interactions. The particular focus of this paper is the case where these interactions take place via an untrusted intermediary device, and where the use of HIPs can be used to establish a secure channel between the human and target machine. A number of application scenarios of this general type are considered, and in each case the possible use of HIPs to improve interaction security is explored. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Mitchell, C. J. (2009). Using human interactive proofs to secure human-machine interactions via untrusted intermediaries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5087 LNCS, pp. 164–170). https://doi.org/10.1007/978-3-642-04904-0_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free