Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Eye tracking devices have recently become increasingly popular as an interface between people and consumer-grade electronic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2015
2015
Embedded sensing systems are pervasively used in life- and security-critical systems such as those found in airplanes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Exploiting physical layer characteristics to enhance or complement authentication strength in wireless networks has been… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Exploiting the unique properties of the physical layer to enhance or complement authentication strength in wireless networks has… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2010
2010
Internet users today often have usernames and passwords at multiple web sites. To simplify things, many sites support some form… (More)
  • table 2
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This article classifies common Internet banking authentication methods regarding potential threats and their level of security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Can we secure user authentication against eavesdropping adversaries, relying on human cognitive functions alone, unassisted by… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is an emerging technology which brings enormous productivity benefits in applications where… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Powerful mobile devices with minimal I/O capabilities increase the likelihood that we will want to annex these devices to I/O… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?