共 25 条
[1]
[Anonymous], 2006, Proceedings of the 4th ACM Workshop on Formal Methods in Security
[2]
[Anonymous], 2008, SOUPS 2008 P 4 S US
[3]
Asudeh A., 2009, Lexical-Functional Grammar- The Oxford Handbook of Linguistic Analysis
[4]
Buyya R, 2010, LECT NOTES COMPUT SC, V6081, P13
[5]
Chen W., 2006, Networking, international conference on systems and international conference on mobile communications and learning technologies, P38
[6]
Chew M, 2004, LECT NOTES COMPUT SC, V3225, P268
[7]
Datta R., 2005, 13th Annual ACM International Conference on Multimedia, P331, DOI 10.1145/1101149.1101218
[8]
Giroire F, 2009, LECT NOTES COMPUT SC, V5758, P326, DOI 10.1007/978-3-642-04342-0_17
[9]
Goth G, 2007, IEEE INTERNET COMPUT, V11, P7, DOI [10.1109/MIC.2007.32, 10.1109/MIC.2007.87]
[10]
Sequenced Tagged Captcha: Generation and its Analysis
[J].
2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3,
2009,
:1286-+