Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,905,984 papers from all fields of science
Search
Sign In
Create Free Account
Challenge–response authentication
Known as:
Challenge/response system
, Challenge
, Challenge-response system
Expand
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Algorithm
Alice and Bob
Authentication
Brute-force attack
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
LESS: Lightweight Establishment of Secure Session: A Cross-Layer Approach Using CoAP and DTLS-PSK Channel Encryption
Abhijan Bhattacharyya
,
Tulika Bose
,
S. Bandyopadhyay
,
Arijit Ukil
,
A. Pal
IEEE 29th International Conference on Advanced…
2015
Corpus ID: 12956132
Secure yet lightweight protocol for communication over the Internet is a pertinent problem for constrained environments in the…
Expand
Highly Cited
2014
Highly Cited
2014
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing
Tao Jiang
,
Xiaofeng Chen
,
Jin Li
,
D. Wong
,
Jianfeng Ma
,
Joseph K. Liu
Information Security Practice and Experience
2014
Corpus ID: 12974356
The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase…
Expand
Highly Cited
2009
Highly Cited
2009
A new graphical password scheme against spyware by using CAPTCHA
Haichang Gao
,
Xiyang Liu
Symposium On Usable Privacy and Security
2009
Corpus ID: 16679430
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware…
Expand
Highly Cited
2008
Highly Cited
2008
A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis
Qingling Cai
,
Zhan Yiju
,
Yonghua Wang
ISECS International Colloquium on Computing…
2008
Corpus ID: 5546972
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A…
Expand
2008
2008
Unidirectional auxiliary channel challenge-response authentication
Dennis K. Nilsson
,
Ulf Larson
,
E. Jonsson
Wireless Telecommunications Symposium
2008
Corpus ID: 274242
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity…
Expand
2007
2007
A novel anti-spam scheme for image-based email
Jianshe Dong
,
Zhanting Yuan
,
Qiuyu Zhang
,
Yufeng Zheng
International Symposium on Data, Privacy, and E…
2007
Corpus ID: 21368475
Spam has become a serious problem not only to the Internet but also to society. In past years, researchers studied the problem…
Expand
2006
2006
A Low Cost Solution to Authentication in Passive RFID Systems
D. Ranasinghe
,
D. Lim
,
P. Cole
,
S. Devadas
Asilomar Conference on Signals, Systems and…
2006
Corpus ID: 14092036
Auto-ID Lab University of Adelaide (c) 2006 Copyright. The document attached has been archived with permission.
Highly Cited
2005
Highly Cited
2005
Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot
Matthew B. Prince
,
Benjamin M. Dahl
,
L. Holloway
,
A. M. Keller
,
Eric Langheinrich
International Conference on Email and Anti-Spam
2005
Corpus ID: 41252269
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot…
Expand
2002
2002
Infinite length hash chains and their applications
K. Bicakci
,
N. Baykal
Proceedings. Eleventh IEEE International…
2002
Corpus ID: 28270262
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and…
Expand
1999
1999
Two Fielded Teams and Two Experts: A RoboCup Challenge Response from the Trenches
Milind Tambe
,
G. Kaminka
,
S. Marsella
,
Ion Muslea
,
T. Raines
International Joint Conference on Artificial…
1999
Corpus ID: 7085458
The RoboCup (robot world-cup soccer) effort, initiated to stimulate research in multi-agents and robotics, has blossomed into a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE