Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,276,763 papers from all fields of science
Search
Sign In
Create Free Account
Challenge-Handshake Authentication Protocol
Known as:
Chap
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Authentication
Challenge–response authentication
Cisco LAN2LAN Personal Office for ISDN
Client (computing)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
Movement and silence
Richard S. Kayne
2005
Corpus ID: 60227508
This volume collects important recent articles by Richard Kayne, one of the top formal linguists in the world. Although the…
Expand
Highly Cited
2005
Highly Cited
2005
WHERE DO WE STAND? COMMON MECHANISMS IN ORGANIZATIONS AND SOCIAL MOVEMENTS RESEARCH
John L. Campbell
2005
Corpus ID: 14901971
The premise of this volume is that both organizations and social movements are forms of coordinated collective action and…
Expand
Highly Cited
2003
Highly Cited
2003
Third International Handbook on Mathematics Education
M. Clements
,
A. Bishop
,
C. Keitel
,
J. Kilpatrick
,
F. Leung
2003
Corpus ID: 61351412
Past, present and future dimensions of mathematics education: Introduction to the Third International Handbook of Mathematics…
Expand
Highly Cited
2002
Highly Cited
2002
Experimental verification of backward-wave radiation from a negative refractive index metamaterial
A. Grbic
,
G. Eleftheriades
2002
Corpus ID: 55867036
A composite medium consisting of an array of fine wires and split-ring resonators has been previously used to experimentally…
Expand
Highly Cited
2000
Highly Cited
2000
The Past in the Present: A Cleavage Theory of Party Response to European Integration
G. Marks
,
Carole J. Wilson
2000
Corpus ID: 154458493
This article explains the positions taken by national political parties on the issue of European integration over the period 1984…
Expand
Review
2000
Review
2000
Verification of two versions of the challenge handshake authentication protocol (chap)
G. Leduc
Ann. des Télécommunications
2000
Corpus ID: 8704563
The challenge handshake authentication protocol, chap, is an authentication protocol intended for use primarily by hosts and…
Expand
Highly Cited
2000
Highly Cited
2000
Institutional Assets and Adaptability: NATO After the Cold War
C. Wallander
International Organization
2000
Corpus ID: 43653165
The puzzle of NATO's persistence is best addressed as part of a larger inquiry into institutional change. Institutions persist…
Expand
Highly Cited
1995
Highly Cited
1995
Bayesian Learning for Neural Networks
Radford M. Neal
1995
Corpus ID: 60809283
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions…
Expand
Review
1993
Review
1993
Oak Regeneration: Serious Problems Practical Recommendations (Symposium Proceedings)
D. Loftis
,
C. Mcgee
1993
Corpus ID: 114587690
An Historical Perspective of Oak Regeneration F. Bryan Clark, USDA Foresf Service, Retired, Anmndale, VA 22003 Concerns about oak…
Expand
Review
1957
Review
1957
Laboratory studies of the roughness and suspended load of alluvial streams
V. Vanoni
,
N. Brooks
1957
Corpus ID: 106483159
This report describes research work done under Contract No. DA-25-075-eng-3866 with the U. S. Army, Corps of Engineers, Missouri…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE