Skip to search formSkip to main contentSkip to account menu

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This paper introduces the notion of Architectural Bias, which can be used to measure the influence of the architecture of Arbiter… 
2013
2013
Physical Unclonable Functions (PUF) are novel chip identifiers with an extensive array of uses in security applications. In this… 
Highly Cited
2009
Highly Cited
2009
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware… 
2008
2008
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity… 
Highly Cited
2008
Highly Cited
2008
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A… 
2007
2007
Spam has become a serious problem not only to the Internet but also to society. In past years, researchers studied the problem… 
Highly Cited
2005
Highly Cited
2005
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot… 
2002
2002
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and… 
2001
2001
This work proposes two identification algorithms based on some difficult problems. The first scheme is an extremely simple… 
1999
1999
The RoboCup (robot world-cup soccer) effort, initiated to stimulate research in multi-agents and robotics, has blossomed into a…