Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,184,852 papers from all fields of science
Search
Sign In
Create Free Account
Challenge–response authentication
Known as:
Challenge/response system
, Challenge
, Challenge-response system
Expand
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Algorithm
Alice and Bob
Authentication
Brute-force attack
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Hidden Voice Commands
Nicholas Carlini
,
Pratyush Mishra
,
+5 authors
Wenchao Zhou
USENIX Security Symposium
2016
Corpus ID: 6217368
Voice interfaces are becoming more ubiquitous and are now the primary input method for many devices. We explore in this paper how…
Expand
Highly Cited
2016
Highly Cited
2016
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices
Yansong Gao
,
Gefei Li
,
+4 authors
D. Ranasinghe
IEEE International Conference on Pervasive…
2016
Corpus ID: 15758369
Low cost pervasive devices such as RFID (radio-frequency identification) tags and sensor nodes are increasingly becoming part of…
Expand
Highly Cited
2015
Highly Cited
2015
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks
Yasser Shoukry
,
Paul D. Martin
,
Y. Yona
,
S. Diggavi
,
M. Srivastava
Conference on Computer and Communications…
2015
Corpus ID: 207229852
Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes…
Expand
Highly Cited
2013
Highly Cited
2013
PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks
Dan Shan
,
K. Zeng
,
Weidong Xiang
,
P. Richardson
,
Yan Dong
IEEE Journal on Selected Areas in Communications
2013
Corpus ID: 16181871
Exploiting the unique properties of the physical layer to enhance or complement authentication strength in wireless networks has…
Expand
Highly Cited
2010
Highly Cited
2010
Modeling attacks on physical unclonable functions
U. Rührmair
,
Frank Sehnke
,
J. Sölter
,
G. Dror
,
S. Devadas
,
J. Schmidhuber
Conference on Computer and Communications…
2010
Corpus ID: 13961278
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks…
Expand
2010
2010
2-clickAuth Optical Challenge-Response Authentication
Anna Vapen
,
David Byers
,
N. Shahmehri
ARES
2010
Corpus ID: 2367294
Internet users today often have usernames and passwords at multiple web sites. To simplify things, many sites support some form…
Expand
Highly Cited
2007
Highly Cited
2007
Provable data possession at untrusted stores
G. Ateniese
,
R. Burns
,
+4 authors
D. Song
Conference on Computer and Communications…
2007
Corpus ID: 8010083
We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to…
Expand
Highly Cited
2005
Highly Cited
2005
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
T. Dimitriou
Security and Privacy in Communication Networks
2005
Corpus ID: 16908175
RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to…
Expand
Highly Cited
2005
Highly Cited
2005
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
Keunwoo Rhee
,
Jin Kwak
,
Seungjoo Kim
,
Dongho Won
International Conference on Security in Pervasive…
2005
Corpus ID: 22847127
Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may…
Expand
Highly Cited
2004
Highly Cited
2004
Client-Side Defense Against Web-Based Identity Theft
N. Chou
,
R. Ledesma
,
Y. Teraguchi
,
John C. Mitchell
Network and Distributed System Security Symposium
2004
Corpus ID: 1688370
Web spoofing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE