Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… 
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2010
Highly Cited
2010
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks… 
  • table 1
  • figure 1
  • table 3
  • figure 2
  • table 4
2010
2010
Internet users today often have usernames and passwords at multiple web sites. To simplify things, many sites support some form… 
  • table 2
  • table 1
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2007
Highly Cited
2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to… 
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2006
Highly Cited
2006
  • D. Weinshall
  • IEEE Symposium on Security and Privacy (S&P'06)
  • 2006
  • Corpus ID: 267586
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by… 
  • figure 1
  • figure 2
  • table 1
  • figure 3
Highly Cited
2005
Highly Cited
2005
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may… 
Highly Cited
2005
Highly Cited
2005
  • T. Dimitriou
  • First International Conference on Security and…
  • 2005
  • Corpus ID: 16908175
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to… 
  • figure 1
  • figure 2
Highly Cited
2004
Highly Cited
2004
This paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise… 
Highly Cited
2004
Highly Cited
2004
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing… 
  • figure 1
  • figure 2
  • figure 4
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where… 
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 2