Skip to search formSkip to main contentSkip to account menu

Challenge-Handshake Authentication Protocol

Known as: Chap 
In computing, the Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity. That entity… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2005
Highly Cited
2005
This volume collects important recent articles by Richard Kayne, one of the top formal linguists in the world. Although the… 
Highly Cited
2005
Highly Cited
2005
The premise of this volume is that both organizations and social movements are forms of coordinated collective action and… 
Highly Cited
2003
Highly Cited
2003
Past, present and future dimensions of mathematics education: Introduction to the Third International Handbook of Mathematics… 
Highly Cited
2002
Highly Cited
2002
A composite medium consisting of an array of fine wires and split-ring resonators has been previously used to experimentally… 
Highly Cited
2000
Highly Cited
2000
This article explains the positions taken by national political parties on the issue of European integration over the period 1984… 
Review
2000
Review
2000
  • G. Leduc
  • 2000
  • Corpus ID: 8704563
The challenge handshake authentication protocol, chap, is an authentication protocol intended for use primarily by hosts and… 
Highly Cited
2000
Highly Cited
2000
The puzzle of NATO's persistence is best addressed as part of a larger inquiry into institutional change. Institutions persist… 
Highly Cited
1995
Highly Cited
1995
Artificial "neural networks" are widely used as flexible models for classification and regression applications, but questions… 
Review
1993
Review
1993
An Historical Perspective of Oak Regeneration F. Bryan Clark, USDA Foresf Service, Retired, Anmndale, VA 22003 Concerns about oak… 
Review
1957
Review
1957
This report describes research work done under Contract No. DA-25-075-eng-3866 with the U. S. Army, Corps of Engineers, Missouri…