Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 229,567,076 papers from all fields of science
Search
Sign In
Create Free Account
Challenge–response authentication
Known as:
Challenge/response system
, Challenge
, Challenge-response system
Expand
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Algorithm
Alice and Bob
Authentication
Brute-force attack
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants
D. Sahoo
,
Phuong Ha Nguyen
,
R. Chakraborty
,
Debdeep Mukhopadhyay
IACR Cryptology ePrint Archive
2016
Corpus ID: 6757181
This paper introduces the notion of Architectural Bias, which can be used to measure the influence of the architecture of Arbiter…
Expand
2013
2013
Easy-to-build Arbiter Physical Unclonable Function with enhanced challenge/response set
D. Ganta
,
L. Nazhandali
International Symposium on Quality Electronic…
2013
Corpus ID: 30167066
Physical Unclonable Functions (PUF) are novel chip identifiers with an extensive array of uses in security applications. In this…
Expand
Highly Cited
2009
Highly Cited
2009
A new graphical password scheme against spyware by using CAPTCHA
Haichang Gao
,
Xiyang Liu
Symposium On Usable Privacy and Security
2009
Corpus ID: 16679430
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware…
Expand
2008
2008
Unidirectional auxiliary channel challenge-response authentication
Dennis K. Nilsson
,
Ulf Larson
,
E. Jonsson
Wireless Telecommunications Symposium
2008
Corpus ID: 274242
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2007
2007
A novel anti-spam scheme for image-based email
Jianshe Dong
,
Zhanting Yuan
,
Qiuyu Zhang
,
Yufeng Zheng
International Symposium on Data, Privacy, and E…
2007
Corpus ID: 21368475
Spam has become a serious problem not only to the Internet but also to society. In past years, researchers studied the problem…
Expand
Highly Cited
2005
Highly Cited
2005
Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot
Matthew B. Prince
,
Benjamin M. Dahl
,
L. Holloway
,
A. M. Keller
,
Eric Langheinrich
International Conference on Email and Anti-Spam
2005
Corpus ID: 41252269
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot…
Expand
2002
2002
Infinite length hash chains and their applications
K. Bicakci
,
N. Baykal
Proceedings. Eleventh IEEE International…
2002
Corpus ID: 28270262
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and…
Expand
2001
2001
Strong Solutions to the Identification Problem
P. Caballero-Gil
,
C. Hernández-Goya
International Computing and Combinatorics…
2001
Corpus ID: 9756980
This work proposes two identification algorithms based on some difficult problems. The first scheme is an extremely simple…
Expand
1999
1999
Two Fielded Teams and Two Experts: A RoboCup Challenge Response from the Trenches
Milind Tambe
,
G. Kaminka
,
S. Marsella
,
Ion Muslea
,
T. Raines
International Joint Conference on Artificial…
1999
Corpus ID: 7085458
The RoboCup (robot world-cup soccer) effort, initiated to stimulate research in multi-agents and robotics, has blossomed into a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE