Skip to search formSkip to main contentSkip to account menu

Challenge-Handshake Authentication Protocol

Known as: Chap 
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks… 
2009
2009
This article first introductes Chap protocol,points out its security vulnerability,and then makes ChapNew protocol,analyzes its… 
2005
2005
The paper expounds the identity authentication protocol of CHAP,analyzes its security,and proposes an improved scheme which is… 
Highly Cited
1995
Highly Cited
1995
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions… 
Highly Cited
1995
Highly Cited
1995
que en France. Ces contributions por­ tant sur divers terrains d'enquete, mettent en exergue la decentralisat ion des actions et… 
1995
1995
This paper examines the language of rights as it appears within Community law, and looks at the varying contexts in which it is… 
1992
1992
This work is concerned with the way in which principled theories of syntax and modular theories of mind may participate in an… 
Highly Cited
1984
Highly Cited
1984
Rhizobial isolates from six host genera (Cicer, Phaseolus, Leucaena, Lens, Melilotus and Trifolium) were screened for ability to… 
Highly Cited
1983
Highly Cited
1983
ion and Notation Computer Classes and Evolution A computer is a complex system incorporating diverse technologies. Typically…