Skip to search formSkip to main contentSkip to account menu

Challenge–response authentication

Known as: Challenge/response system, Challenge, Challenge-response system 
In computer security, challenge-response authentication is a family of protocols in which one party presents a question ("challenge") and another… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Secure yet lightweight protocol for communication over the Internet is a pertinent problem for constrained environments in the… 
Highly Cited
2014
Highly Cited
2014
The semi-trusted servers in cloud environment may outsource the files of their clients to some low expensive servers to increase… 
Highly Cited
2009
Highly Cited
2009
To date, there have been some schemes which have made contributions to the development of graphical password in term of spyware… 
Highly Cited
2008
Highly Cited
2008
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A… 
2008
2008
We propose an approach for authentication of exchanged public values between two previously unknown devices in close proximity… 
2007
2007
Spam has become a serious problem not only to the Internet but also to society. In past years, researchers studied the problem… 
2006
2006
Auto-ID Lab University of Adelaide (c) 2006 Copyright. The document attached has been archived with permission. 
Highly Cited
2005
Highly Cited
2005
This paper summarizes and analyses data compiled on the activities of email harvesters gathered through a 5,000+ member honey pot… 
2002
2002
Hash chains are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and… 
1999
1999
The RoboCup (robot world-cup soccer) effort, initiated to stimulate research in multi-agents and robotics, has blossomed into a…