Skip to search formSkip to main contentSkip to account menu

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Biometrics have been widely adopted for enhancing user authentication, benefiting usability by exploiting pervasive and… 
2015
2015
In this paper, we propose a novel Artificial-Noise-Aided PHYsical layer Phase Challenge-Response Authentication Scheme (ANA-PHY… 
2015
2015
This work presents the optimized design of a physical unclonable function (PUF) primitive based on the cross-point resistive… 
2010
2010
Internet users today often have usernames and passwords at multiple web sites. To simplify things, many sites support some form… 
Highly Cited
2009
Highly Cited
2009
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware… 
Highly Cited
2008
Highly Cited
2008
We describe a new function called SQUASH(which is short for SQUare-hASH), which is ideally suited to challenge-response MAC… 
Highly Cited
2005
Highly Cited
2005
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may… 
Highly Cited
2003
Highly Cited
2003
We propose a new graphical password scheme. It is de ned as a challenge-response identi cation. Hence, a password in our scheme… 
2002
2002
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and… 
Highly Cited
1989
Highly Cited
1989
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a…