Academic literature on the topic 'Challenge-response protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Challenge-response protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Challenge-response protocol"
Rhee, Keun-Woo, Dong-Kyu Oh, Jin Kwak, Soo-Hyun Oh, Seung-Joo Kim, and Dong-Ho Won. "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment." KIPS Transactions:PartC 12C, no. 3 (2005): 309–16. http://dx.doi.org/10.3745/kipstc.2005.12c.3.309.
Full textWei, Da Wei, Wei Liu, and Xiu Feng Zhao. "The Deniability Analysis for a Deniable Authentication Protocol." Applied Mechanics and Materials 195-196 (August 2012): 992–97. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.992.
Full textPaul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Full textAl-Maliki, Ossama, and Hisham Al-Assam. "Challenge-response mutual authentication protocol for EMV contactless cards." Computers & Security 103 (April 2021): 102186. http://dx.doi.org/10.1016/j.cose.2021.102186.
Full textRastogi, Nitesh, Avinav Pathak, and Shweta Rastogi. "Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol." International Journal of Computer Applications 62, no. 9 (2013): 15–19. http://dx.doi.org/10.5120/10107-4764.
Full textJeon, Il-Soo, and Eun-Jun Yoon. "RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response." Journal of the Korea Industrial Information Systems Research 17, no. 3 (2012): 19–26. http://dx.doi.org/10.9723/jksiis.2012.17.3.019.
Full textAzdad, Nabila, and Mohamed Elboukhari. "FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 02 (2024): 43–51. http://dx.doi.org/10.3991/ijim.v18i02.42985.
Full textCambou, Bertrand Francis, and Mahafujul Alam. "Challenge–Response Pair Mechanisms and Multi-Factor Authentication Schemes to Protect Private Keys." Applied Sciences 15, no. 6 (2025): 3089. https://doi.org/10.3390/app15063089.
Full textSha Feng, Dongming Yu, Juanjuan Gong, Tao Men,. "An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication." Journal of Electrical Systems 20, no. 2 (2024): 1955–60. http://dx.doi.org/10.52783/jes.1642.
Full textGabr, Mahmoud M., Mahmoud M. Zakaria, Ayman F. Refaie, et al. "Generation of Insulin-Producing Cells from Human Bone Marrow-Derived Mesenchymal Stem Cells: Comparison of Three Differentiation Protocols." BioMed Research International 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/832736.
Full textDissertations / Theses on the topic "Challenge-response protocol"
Коваленко, Богдан Анатолiйович, та Bohdan Kovalenko. "Методи побудови клептографiчних механiзмiв та систем стiйких до клептографiчних модифiкацiй". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44188.
Full textLu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.
Full textBooks on the topic "Challenge-response protocol"
Hotopf, Matthew. Diagnosis, assessment, and treatment of depression in advanced disease. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198806677.003.0009.
Full textBook chapters on the topic "Challenge-response protocol"
de Oliveira Albuquerque, Robson, Luis Javier García Villalba, and Rafael Timóteo de Sousa. "Enhancing an Integer Challenge-Response Protocol." In Computational Science and Its Applications – ICCSA 2008. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-69848-7_43.
Full textRhee, Keunwoo, Jin Kwak, Seungjoo Kim, and Dongho Won. "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment." In Security in Pervasive Computing. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-32004-3_9.
Full textZmezm, Hareth, Hamzah F. Zmezm, Mustafa S. Khalefa, and Hamid Ali Abed Alasadi. "Design and Implementation of Challenge Response Protocol for Enhanced e-Commerce Security." In Proceedings of the Future Technologies Conference (FTC) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02683-7_7.
Full textHuang, Keke, Changlu Lin, and Yali Liu. "A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-17081-2_6.
Full textMatelski, Sławomir. "Secure Human Identification Protocol with Human-Computable Passwords." In Information Security Practice and Experience. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21280-2_25.
Full textKodada, Basappa B., and Demian Antony D’Mello. "Challenge-Response Based Data Integrity Verification (DIV) and Proof of Ownership (PoW) Protocol for Cloud Data." In Communications in Computer and Information Science. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88378-2_3.
Full textKern, Michael, and Sébastien Ferreira-Cerca. "Differential Translation Activity Analysis Using Bioorthogonal Noncanonical Amino Acid Tagging (BONCAT) in Archaea." In Ribosome Biogenesis. Springer US, 2022. http://dx.doi.org/10.1007/978-1-0716-2501-9_14.
Full textMbaya, Olivier Tshiani, Wissedi Njoh, Kevin Barrett, Mary Smolskis, Alejandra Miranda, and Nikki Gettinger. "40 Selecting and Opening a Clinical Research Site in a Low-Resource Setting." In Principles and Practice of Emergency Research Response. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-48408-7_60.
Full text"Challenge-Response Protocol." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_1269.
Full text"Challenge-Response Protocol." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_300151.
Full textConference papers on the topic "Challenge-response protocol"
Jaiswal, Chandra Keshwar, Arpit Sharma, and Atul Chaturvedi. "Challenge Response Protocol using Multivariate Polynomial Cryptography." In 2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS). IEEE, 2025. https://doi.org/10.1109/sceecs64059.2025.10940858.
Full textYue, Wenjin, Lianchuan Ma, Kaicheng Li, and Tao Tang. "Challenge-Response Protocol Based on Secret Sharing in Cloud Safety Computing Platform." In 2024 IEEE 27th International Conference on Intelligent Transportation Systems (ITSC). IEEE, 2024. https://doi.org/10.1109/itsc58415.2024.10920131.
Full textYang, Haomin, Yaoxue Zhang, and Yuezhi Zhou. "A Certificateless Two-Party Key Agreement Protocol from Challenge-Response Signatures." In 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2012. http://dx.doi.org/10.1109/wicom.2012.6478268.
Full textAlkanhal, Mona, Abdulaziz Alali, and Mohamed Younis. "PUF-Based Authentication Protocol with Physical Layer-Based Obfuscated Challenge-Response Pair." In ICC 2023 - IEEE International Conference on Communications. IEEE, 2023. http://dx.doi.org/10.1109/icc45041.2023.10278899.
Full textJia-Qi, Li, and Yang Jun. "Challenge-Response Attack on a Key Transport Protocol based on a Ring Locking Technique." In 2012 International Conference on Industrial Control and Electronics Engineering (ICICEE). IEEE, 2012. http://dx.doi.org/10.1109/icicee.2012.190.
Full textElkamchouchi, Hassan, Abdel-Aty Emarah, and Esam A. A. Hagras. "A New Public Key Signcrypted Challenge Response Identification (PKS-CR-ID) Protocol Using Smart Cards." In 2006 International Conference on Computer Engineering and Systems. IEEE, 2006. http://dx.doi.org/10.1109/icces.2006.320455.
Full textAmoah, Raphael, Suriadi Suriadi, Seyit Camtepe, and Ernest Foo. "Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model." In ICC 2014 - 2014 IEEE International Conference on Communications. IEEE, 2014. http://dx.doi.org/10.1109/icc.2014.6883422.
Full textChen, Bae-Ling, Wen-Chung Kuo, and Lih-Chyau Wuu. "Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response." In 2011 Fifth International Conference on Genetic and Evolutionary Computing (ICGEC). IEEE, 2011. http://dx.doi.org/10.1109/icgec.2011.10.
Full textCajka, Tomas, Jiri Hricko, Lucie Rudl Kulhava, Michaela Novakova, Michaela Paucova, and Ondrej Kuda. "MetaboAtlas21: A comprehensive metabolome and lipidome atlas of mouse tissues and biofluids." In 2022 AOCS Annual Meeting & Expo. American Oil Chemists' Society (AOCS), 2022. http://dx.doi.org/10.21748/mzeg6052.
Full textCiornei, Stefan, Dan Gheorghe Drugociu, Liliana Ciornei, Florin Nechifor, and Petru Roșca. "Proceduri de embriotransfer la bivoliță (Bivolul indigen românesc)." In Simpozion Ştiinţific Internaţional "50 ani de învăţământ superior medical veterinar din Republica Moldova". Technical University of Moldova, 2025. https://doi.org/10.52326/ismv2024.31.
Full textReports on the topic "Challenge-response protocol"
Melnikov, A. Lightweight Directory Access Protocol (LDAP) Schema for Storing Salted Challenge Response Authentication Mechanism (SCRAM) Secrets. RFC Editor, 2010. http://dx.doi.org/10.17487/rfc5803.
Full textSuksom, Daroonwan, Jettanong Klaewsongkram, Wannaporn Tongtako, and Nutdanai Jaronsukwimal. Effect of acute exercises, chronic exercise training and vitamin C supplementation on physiological change and symptoms in allegic rhinitis patients. Chulalongkorn University, 2013. https://doi.org/10.58837/chula.res.2013.72.
Full textAnderson, Lowell A., Neal Black, Thomas J. Hagerty, John P. Kluge, and Paul L. Sundberg. Pseudorabies (Aujeszky’s Disease) and Its Eradication: A Review of the U.S. Experience. U.S. Department of Agriculture, Animal and Plant Health Inspection Service, 2008. http://dx.doi.org/10.32747/2008.7207242.aphis.
Full textBass, Eric, Paul Shekelle, Jonathan Treadwell, et al. Making Healthcare Safer IV: Summary of Findings on Patient Safety Practices and Ratings by a Technical Expert Panel, 2024-2025. AHRQ, 2025. https://doi.org/10.23970/ahrqepc_mhs4year2.
Full textMcElwain, Terry F., Eugene Pipano, Guy H. Palmer, Varda Shkap, Stephn A. Hines, and Wendy C. Brown. Protection of Cattle against Babesiosis: Immunization against Babesia bovis with an Optimized RAP-1/Apical Complex Construct. United States Department of Agriculture, 1999. http://dx.doi.org/10.32747/1999.7573063.bard.
Full textYaron, Zvi, Abigail Elizur, Martin Schreibman, and Yonathan Zohar. Advancing Puberty in the Black Carp (Mylopharyngodon piceus) and the Striped Bass (Morone saxatilis). United States Department of Agriculture, 2000. http://dx.doi.org/10.32747/2000.7695841.bard.
Full textWideman, Jr., Robert F., Nicholas B. Anthony, Avigdor Cahaner, Alan Shlosberg, Michel Bellaiche, and William B. Roush. Integrated Approach to Evaluating Inherited Predictors of Resistance to Pulmonary Hypertension Syndrome (Ascites) in Fast Growing Broiler Chickens. United States Department of Agriculture, 2000. http://dx.doi.org/10.32747/2000.7575287.bard.
Full textResponding to Climate Change: A Proposed Framework for Action. Inter-American Development Bank, 2000. http://dx.doi.org/10.18235/0006782.
Full text