Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Exploiting the unique properties of the physical layer to enhance or complement authentication strength in wireless networks has… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We discuss numerical modeling attacks on several proposed strong physical unclonable functions (PUFs). Given a set of challenge… Expand
  • table I
  • figure 1
  • figure 2
  • table II
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We introduce a model for provable data possession (PDP) that can be used for remote data checking: A client that has stored data… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks… Expand
  • table 1
  • figure 1
  • table 3
  • figure 2
  • table 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
  • D. Weinshall
  • IEEE Symposium on Security and Privacy (S&P'06)
  • 2006
  • Corpus ID: 267586
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • G. Hancke, M. Kuhn
  • First International Conference on Security and…
  • 2005
  • Corpus ID: 435025
Radio-frequency identification tokens, such as contactless smartcards, are vulnerable to relay attacks if they are used for… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
  • T. Dimitriou
  • First International Conference on Security and…
  • 2005
  • Corpus ID: 16908175
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may… Expand
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing… Expand
  • figure 1
  • figure 2
  • figure 4
Is this relevant?