Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,497 papers from all fields of science
Search
Sign In
Create Free Account
Challenge–response authentication
Known as:
Challenge/response system
, Challenge
, Challenge-response system
Expand
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Algorithm
Alice and Bob
Authentication
Brute-force attack
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission
Xiaofu Wu
,
Zhen Yang
,
Cong Ling
,
X. Xia
IEEE Transactions on Wireless Communications
2015
Corpus ID: 206827475
In this paper, we propose a novel Artificial-Noise-Aided PHYsical layer Phase Challenge-Response Authentication Scheme (ANA-PHY…
Expand
2015
2015
Exploiting resistive cross-point array for compact design of physical unclonable function
Pai-Yu Chen
,
R. Fang
,
Rui Liu
,
C. Chakrabarti
,
Yu Cao
,
Shimeng Yu
IEEE International Symposium on Hardware Oriented…
2015
Corpus ID: 24407642
This work presents the optimized design of a physical unclonable function (PUF) primitive based on the cross-point resistive…
Expand
Highly Cited
2015
Highly Cited
2015
A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks
D. Sahoo
,
Phuong Ha Nguyen
,
Debdeep Mukhopadhyay
,
R. Chakraborty
IEEE Transactions on Computer-Aided Design of…
2015
Corpus ID: 18547898
Due to their unique physical properties, physically unclonable functions (PUF) have been proposed widely as versatile…
Expand
Highly Cited
2014
Highly Cited
2014
On design of a highly secure PUF based on non-linear current mirrors
Raghavan Kumar
,
W. Burleson
IEEE International Symposium on Hardware Oriented…
2014
Corpus ID: 15013767
Physically Unclonable Functions (PUFs) are lightweight hardware security primitives for generating unique signatures from the…
Expand
Highly Cited
2009
Highly Cited
2009
A new graphical password scheme against spyware by using CAPTCHA
Haichang Gao
,
Xiyang Liu
Symposium On Usable Privacy and Security
2009
Corpus ID: 16679430
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware…
Expand
Highly Cited
2008
Highly Cited
2008
Attacks on time-of-flight distance bounding channels
G. Hancke
,
M. Kuhn
Wireless Network Security
2008
Corpus ID: 15897102
Cryptographic distance-bounding protocols verify the proximity of two parties by timing a challenge-response exchange. Such…
Expand
Highly Cited
2005
Highly Cited
2005
Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot
Matthew B. Prince
,
Benjamin M. Dahl
,
L. Holloway
,
A. M. Keller
,
Eric Langheinrich
International Conference on Email and Anti-Spam
2005
Corpus ID: 41252269
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot…
Expand
Highly Cited
2003
Highly Cited
2003
A Shoulder-Surfing Resistant Graphical Password Scheme - WIW
Shushuang Man
,
Dawei Hong
,
M. Matthews
Security and Management
2003
Corpus ID: 1045202
We propose a new graphical password scheme. It is de ned as a challenge-response identi cation. Hence, a password in our scheme…
Expand
2002
2002
Infinite length hash chains and their applications
K. Bicakci
,
N. Baykal
Proceedings. Eleventh IEEE International…
2002
Corpus ID: 28270262
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and…
Expand
Highly Cited
1989
Highly Cited
1989
Limitations of challenge-response entity authentication
C. Mitchell
1989
Corpus ID: 62132929
We consider two basic versions of the challenge-response authentication protocol, and exhibit both a method of attack and a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE