Author of the publication

How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.

, , , , and . IEEE Symposium on Security and Privacy, page 399-413. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametricity and Variants of Girard's J Operator., and . Inf. Process. Lett., 70 (1): 1-5 (1999)Determination of Thermodynamic and Kinetic Parameters from Isothermal Heat Conduction Microcalorimetry: Applications to Long-Term-Reaction Studies, , , and . The Journal of Physical Chemistry, 99 (18): 7108--7113 (May 1995)Probabilistic Polynomial-Time Semantics for a Protocol Security Logic., , , , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 16-29. Springer, (2005)Notes on Typed Object-Oriented Programming., and . TACS, volume 789 of Lecture Notes in Computer Science, page 844-885. Springer, (1994)Contract Signing, Optimism, and Advantage., , , and . CONCUR, volume 2761 of Lecture Notes in Computer Science, page 361-377. Springer, (2003)Connecting Formal Semantics to Constructive Intuitions., , and . Constructivity in Computer Science, volume 613 of Lecture Notes in Computer Science, page 1-21. Springer, (1991)Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs., , and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 133-149. Springer, (2011)Inductive Proofs of Computational Secrecy., , , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 219-234. Springer, (2007)DATALOG with Constraints: A Foundation for Trust Management Languages., and . PADL, volume 2562 of Lecture Notes in Computer Science, page 58-73. Springer, (2003)Representation Independence and Data Abstraction.. POPL, page 263-276. ACM Press, (1986)