Countering Automated Exploits with System Security CAPTCHAS.
Alf ZugenmaierPublished in: Security Protocols Workshop (2005)
Keyphrases
- information security
- intrusion detection
- semi automated
- access control
- human operators
- information assurance
- network security
- statistical databases
- security requirements
- data sets
- security management
- security level
- security systems
- data security
- security issues
- fully automated
- key management
- security policies
- security model
- lightweight
- database
- sensitive data
- security mechanisms
- computer security
- user authentication
- cryptographic protocols
- security problems
- mobile devices