Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. / Mitchell, Chris J.

Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. ed. / Bruce Christianson; B Crispo; James A Malcolm; Michael Roe. Springer-Verlag, 2009. p. 164-170 (Lecture Notes in Computer Science; Vol. 5087).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. / Mitchell, Chris J.

Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. ed. / Bruce Christianson; B Crispo; James A Malcolm; Michael Roe. Springer-Verlag, 2009. p. 164-170 (Lecture Notes in Computer Science; Vol. 5087).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Mitchell, CJ 2009, Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. in B Christianson, B Crispo, JA Malcolm & M Roe (eds), Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Lecture Notes in Computer Science, vol. 5087, Springer-Verlag, pp. 164-170. https://doi.org/10.1007/978-3-642-04904-0_22

APA

Mitchell, C. J. (2009). Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. In B. Christianson, B. Crispo, J. A. Malcolm, & M. Roe (Eds.), Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers (pp. 164-170). (Lecture Notes in Computer Science; Vol. 5087). Springer-Verlag. https://doi.org/10.1007/978-3-642-04904-0_22

Vancouver

Mitchell CJ. Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. In Christianson B, Crispo B, Malcolm JA, Roe M, editors, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Springer-Verlag. 2009. p. 164-170. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-04904-0_22

Author

Mitchell, Chris J. / Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries. Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. editor / Bruce Christianson ; B Crispo ; James A Malcolm ; Michael Roe. Springer-Verlag, 2009. pp. 164-170 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{97162b9ebd2b4424b5de5d32d7c5939c,
title = "Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries",
author = "Mitchell, {Chris J}",
year = "2009",
doi = "10.1007/978-3-642-04904-0_22",
language = "English",
series = "Lecture Notes in Computer Science",
publisher = "Springer-Verlag",
pages = "164--170",
editor = "Bruce Christianson and B Crispo and Malcolm, {James A} and Michael Roe",
booktitle = "Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers",

}

RIS

TY - GEN

T1 - Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

AU - Mitchell, Chris J

PY - 2009

Y1 - 2009

U2 - 10.1007/978-3-642-04904-0_22

DO - 10.1007/978-3-642-04904-0_22

M3 - Conference contribution

T3 - Lecture Notes in Computer Science

SP - 164

EP - 170

BT - Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers

A2 - Christianson, Bruce

A2 - Crispo, B

A2 - Malcolm, James A

A2 - Roe, Michael

PB - Springer-Verlag

ER -