
Acknowledgments
The authors thank Regione Piemonte, through grant “Sinapsi” for supporting this
work. The prototype and the challenge setting have been developed with the coopera-
tion of the Department of Computer Science of the University of Turin and the par-
ticipating company, Certimeter S.r.l.
References
1. M. Blum, L. A. von Ahn, and J. Langford, The CAPTCHA Project, Completely Automatic
Public Turing Test to tell Computers and Humans Apart, www.captcha.net, Dept. of Com-
puter Science, Carnegie–Mellon University, November 2000.
2. S.M.Bellovin, Security Problems in the TCP/IP protocol suite, Computer Communication
Review, AT&T Bell Laboratories, 1989.
3. Steven M. Bellovin, A Technique for Counting NATted Hosts, AT&T Labs Research, 2000.
4. F. Bergadano, D. Gunetti and C. Picardi, User Authentication through Keystroke Dynamics,
ACM Transactions on Information and System Security (ACM TISSEC), 5(4), 2002.
5. Allison L. Coates, Richard J. Fateman and Henry S. Baird, Pessimal Print: A Reverse Tur-
ing Test, Sixth International Conference on Document Analysis and Recognition (ICDAR
2001), Seattle, Washington, September 10-13 2001.
6. K.Egevang, P.Francis, The IP Network Address Translator (NAT), RFC-1631, May 1994.
7. R.Fielding, J.Mogul, H.Frystyk, L.Masinter, P.Leach, T.Berners-Lee, Hypertext Transfer
Protocol HTTP 1.1, RFC-2616, June 1999.
8. D.Kristol, L.Montulli, HTTP State Management Mechanism, Request for Comments RFC-
2965, October 2000.
9. Albert Ludwing, Ip Address Spoofing, Univ. Freiburg,
www.ks.uni.freiburg.de/inetwork/papers/ipspoofingPaper.pdf
10. G. Mori and J. Malik, Breaking a Visual CAPTCHA, UC Berkeley,
http://www.cs.berkeley.edu/~mori/gimpy/gimpy.html
11. Joon S.Park, Ravi Sandhu, AreeLatha Ghanta, RBAC on the web by secure cookies, secu-
rity XIII:Status and prospects, Kluwer, 2000.
12. Eran Reshef, Izhar Bar-Gad, Web Application Security, Sanctum Inc., settembre 2000.
13. S. V. Rice, G. Nagy, and T. A. Nartker, OCR: An Illustrated Guide to the Frontier, Kluwer
Academic Publishers, 1999.
14. Marco de Vivo, Gabriela O. de Vivo, Roberto Koeneke, Germinal Isern, Internet Vulner-
abilities Related to TCP/IP and T/TCP, ACM SIGCOMM Computer Communication Re-
view, January 1999.
115