Skip to search formSkip to main contentSkip to account menu

Challenge-Handshake Authentication Protocol

Known as: Chap 
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Computer communications have been playing a vital role in the world economy. Government organizations, large companies and banks… 
2005
2005
The paper expounds the identity authentication protocol of CHAP,analyzes its security,and proposes an improved scheme which is… 
2003
2003
Black bear dispersal was studied from 1969 to 1982 as part of a study of social behavior, habitat use, and population dynamics in… 
Highly Cited
1995
Highly Cited
1995
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions… 
Highly Cited
1995
Highly Cited
1995
que en France. Ces contributions por­ tant sur divers terrains d'enquete, mettent en exergue la decentralisat ion des actions et… 
Highly Cited
1984
Highly Cited
1984
Rhizobial isolates from six host genera (Cicer, Phaseolus, Leucaena, Lens, Melilotus and Trifolium) were screened for ability to… 
Highly Cited
1983
Highly Cited
1983
ion and Notation Computer Classes and Evolution A computer is a complex system incorporating diverse technologies. Typically… 
Highly Cited
1983
Review
1966
Review
1966
The cambium is t.hc lateral meristem that produces secondary xy lem and phloem in the axes and appendages of pract ica l ly all…