Skip to search formSkip to main contentSkip to account menu

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
In this paper, we propose a novel Artificial-Noise-Aided PHYsical layer Phase Challenge-Response Authentication Scheme (ANA-PHY… 
2015
2015
This work presents the optimized design of a physical unclonable function (PUF) primitive based on the cross-point resistive… 
Highly Cited
2015
Highly Cited
2015
Due to their unique physical properties, physically unclonable functions (PUF) have been proposed widely as versatile… 
Highly Cited
2014
Highly Cited
2014
Physically Unclonable Functions (PUFs) are lightweight hardware security primitives for generating unique signatures from the… 
Highly Cited
2009
Highly Cited
2009
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware… 
Highly Cited
2008
Highly Cited
2008
Cryptographic distance-bounding protocols verify the proximity of two parties by timing a challenge-response exchange. Such… 
Highly Cited
2005
Highly Cited
2005
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot… 
Highly Cited
2003
Highly Cited
2003
We propose a new graphical password scheme. It is de ned as a challenge-response identi cation. Hence, a password in our scheme… 
2002
2002
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and… 
Highly Cited
1989
Highly Cited
1989
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a…