Journal articles on the topic 'Challenge-response protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Challenge-response protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Rhee, Keun-Woo, Dong-Kyu Oh, Jin Kwak, Soo-Hyun Oh, Seung-Joo Kim, and Dong-Ho Won. "Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment." KIPS Transactions:PartC 12C, no. 3 (2005): 309–16. http://dx.doi.org/10.3745/kipstc.2005.12c.3.309.
Full textWei, Da Wei, Wei Liu, and Xiu Feng Zhao. "The Deniability Analysis for a Deniable Authentication Protocol." Applied Mechanics and Materials 195-196 (August 2012): 992–97. http://dx.doi.org/10.4028/www.scientific.net/amm.195-196.992.
Full textPaul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.
Full textAl-Maliki, Ossama, and Hisham Al-Assam. "Challenge-response mutual authentication protocol for EMV contactless cards." Computers & Security 103 (April 2021): 102186. http://dx.doi.org/10.1016/j.cose.2021.102186.
Full textRastogi, Nitesh, Avinav Pathak, and Shweta Rastogi. "Enhanced Authentication Scheme using Password Integrated Challenge Response Protocol." International Journal of Computer Applications 62, no. 9 (2013): 15–19. http://dx.doi.org/10.5120/10107-4764.
Full textJeon, Il-Soo, and Eun-Jun Yoon. "RFID Distance Bounding Protocol Using Multiple Bits Challenge and Response." Journal of the Korea Industrial Information Systems Research 17, no. 3 (2012): 19–26. http://dx.doi.org/10.9723/jksiis.2012.17.3.019.
Full textAzdad, Nabila, and Mohamed Elboukhari. "FOTA-MAC: A Novel Traffic Adaptive MAC Protocol for Wireless Body Area Networks." International Journal of Interactive Mobile Technologies (iJIM) 18, no. 02 (2024): 43–51. http://dx.doi.org/10.3991/ijim.v18i02.42985.
Full textCambou, Bertrand Francis, and Mahafujul Alam. "Challenge–Response Pair Mechanisms and Multi-Factor Authentication Schemes to Protect Private Keys." Applied Sciences 15, no. 6 (2025): 3089. https://doi.org/10.3390/app15063089.
Full textSha Feng, Dongming Yu, Juanjuan Gong, Tao Men,. "An Analysis and Improvement Scheme for the Weakness of Kerberos V5 Authentication." Journal of Electrical Systems 20, no. 2 (2024): 1955–60. http://dx.doi.org/10.52783/jes.1642.
Full textGabr, Mahmoud M., Mahmoud M. Zakaria, Ayman F. Refaie, et al. "Generation of Insulin-Producing Cells from Human Bone Marrow-Derived Mesenchymal Stem Cells: Comparison of Three Differentiation Protocols." BioMed Research International 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/832736.
Full textBood, Johan R., Britt-Marie Sundblad, Ingrid Delin, et al. "Urinary excretion of lipid mediators in response to repeated eucapnic voluntary hyperpnea in asthmatic subjects." Journal of Applied Physiology 119, no. 3 (2015): 272–79. http://dx.doi.org/10.1152/japplphysiol.00301.2015.
Full textAn, Zheng. "Research on Comparison of Security Protocols for RFID Systems." Applied and Computational Engineering 99, no. 1 (2024): 7–13. http://dx.doi.org/10.54254/2755-2721/99/20251748.
Full textXiao, Yuelei, and Yang Wu. "5G-IPAKA: An Improved Primary Authentication and Key Agreement Protocol for 5G Networks." Information 13, no. 3 (2022): 125. http://dx.doi.org/10.3390/info13030125.
Full textKamegasawa, Amélia, Maria Tereza Rezkallah Iwasso, Rosa Viero, and Marcello Franco. "Evaluation of different immunization protocols with P. brasiliensis antigens in Guinea pigs." Revista do Instituto de Medicina Tropical de São Paulo 34, no. 3 (1992): 243–49. http://dx.doi.org/10.1590/s0036-46651992000300011.
Full textAlharthi, Abdullah M., and Fahad S. Altuwaijri. "Lightweight IoT Authentication Protocol Using PUFs in Smart Manufacturing Industry." Electronics 14, no. 9 (2025): 1788. https://doi.org/10.3390/electronics14091788.
Full textYi, Fumin, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, and Dawei Zhao. "WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks." Sensors 22, no. 19 (2022): 7413. http://dx.doi.org/10.3390/s22197413.
Full textAljbur, Nazik K., Mohammed Yousif, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, and Mansour Obeida. "Minimizing overhead using efficient PUF-based authentication in flying ad hoc networks." International Journal of Innovative Research and Scientific Studies 8, no. 2 (2025): 4123–36. https://doi.org/10.53894/ijirss.v8i2.6246.
Full textHavrljenko, Jelena, Vesna Kopitovic, Aleksandra Trninic Pjevic, et al. "The Effectiveness of the GnRH Agonist/Antagonist Protocols for Different Poseidon Subgroups of Poor Ovarian Responders." Journal of Clinical Medicine 14, no. 6 (2025): 2026. https://doi.org/10.3390/jcm14062026.
Full textBorenstein, L. A., J. D. Radolf, T. E. Fehniger, D. R. Blanco, J. N. Miller, and M. A. Lovett. "Immunization of rabbits with recombinant Treponema pallidum surface antigen 4D alters the course of experimental syphilis." Journal of Immunology 140, no. 7 (1988): 2415–21. http://dx.doi.org/10.4049/jimmunol.140.7.2415.
Full textPrieto-Sánchez, Andrés, Juan M. García-Ceberino, Juan Luis Leon-Llamas, and Santos Villafaina. "An Incongruent 2-Minute Stroop Task Alters the Response Time Performance in Semi-Elite Soccer Players: A Pilot Study." Applied Sciences 14, no. 22 (2024): 10296. http://dx.doi.org/10.3390/app142210296.
Full textAlobaidy, Yousif Safaa, and Osama Ali Awad. "Real-time optimized wireless networked control system with cooperative network protocols." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (2023): 1350. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1350-1361.
Full textYousif, Safaa Alobaidy, and Ali Awad Osama. "Real-time optimized wireless networked control system with cooperative network protocols." Real-time optimized wireless networked control system with cooperative network protocols 31, no. 3 (2023): 1350–61. https://doi.org/10.11591/ijeecs.v31.i3.pp1350-1361.
Full textHou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.
Full textHudgins, Lisa C., Thomas S. Parker, Daniel M. Levine, and Marc K. Hellerstein. "A Dual Sugar Challenge Test for Lipogenic Sensitivity to Dietary Fructose." Journal of Clinical Endocrinology & Metabolism 96, no. 3 (2011): 861–68. http://dx.doi.org/10.1210/jc.2010-2007.
Full textHayashi, Victor, and Wilson Ruggiero. "Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior." Sensors 20, no. 22 (2020): 6563. http://dx.doi.org/10.3390/s20226563.
Full textRamírez DDS, MSc, PhD, Karol, Daniel Quesada-Yamasaki MLS, and Jaime Fornaguera-Trías PhD. "A Protocol to Perform Systemic Lipopolysacharide (LPS) Challenge in Rats." Odovtos - International Journal of Dental Sciences 21, no. 1 (2019): 53–66. http://dx.doi.org/10.15517/ijds.v21i1.35510.
Full textPaz, Maria Constanza, Natalia Andrea Marchese, Liliana M. Cancela, and Claudia Bregonzio. "Angiotensin II AT1Receptors Are Involved in Neuronal Activation Induced by Amphetamine in a Two-Injection Protocol." BioMed Research International 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/534817.
Full textChen, Yu-Yi, Meng-Lin Tsai, and Jinn-Ke Jan. "The design of RFID access control protocol using the strategy of indefinite-index and challenge-response." Computer Communications 34, no. 3 (2011): 250–56. http://dx.doi.org/10.1016/j.comcom.2010.05.012.
Full textHayashi, Victor Takashi, and Wilson Vicente Ruggiero. "Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning." Sensors 22, no. 4 (2022): 1325. http://dx.doi.org/10.3390/s22041325.
Full textHaby, MM, JK Peat, CM Mellis, SD Anderson, and AJ Woolcock. "An exercise challenge for epidemiological studies of childhood asthma: validity and repeatability." European Respiratory Journal 8, no. 5 (1995): 729–36. http://dx.doi.org/10.1183/09031936.95.08050729.
Full textVitalone-Raccaro, Nancy A. "Revitalizing Strategy Instruction." Intervention in School and Clinic 53, no. 1 (2017): 28–35. http://dx.doi.org/10.1177/1053451217692568.
Full textAlam, Mahafujul, Jeffrey Hoffstein, and Bertrand Cambou. "Privately Generated Key Pairs for Post Quantum Cryptography in a Distributed Network." Applied Sciences 14, no. 19 (2024): 8863. http://dx.doi.org/10.3390/app14198863.
Full textChaudhary, Ravi Raushan Kumar, Ashish Singh, and Kakali Chatterjee. "An Enhanced Authentication Scheme for Internet of Things Based E-Healthcare System." Journal of Computational and Theoretical Nanoscience 17, no. 1 (2020): 246–53. http://dx.doi.org/10.1166/jctn.2020.8658.
Full textIngram, Emma, Lauren Hawkins, David M. Morris, et al. "R1 changes in the human placenta at 3 T in response to a maternal oxygen challenge protocol." Placenta 39 (March 2016): 151–53. http://dx.doi.org/10.1016/j.placenta.2016.01.016.
Full textVan Der Velden, Daphne Liselotte, Lisanne C. Hamming, Henk M. W. Verheul, et al. "The Drug Rediscovery Protocol (DRUP)." Journal of Clinical Oncology 35, no. 15_suppl (2017): 2547. http://dx.doi.org/10.1200/jco.2017.35.15_suppl.2547.
Full textHlavacs, Helmut, Wilfried Gansterer, Hannes Schabauer, et al. "Enhancing ZRTP by using Computational Puzzles." JUCS - Journal of Universal Computer Science 14, no. (5) (2008): 693–716. https://doi.org/10.3217/jucs-014-05-0693.
Full textHansson, Andreas, Kees Goossens, and Andrei Rădulescu. "Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip." VLSI Design 2007 (April 30, 2007): 1–10. http://dx.doi.org/10.1155/2007/95859.
Full textUsman, Muhammad, Rashid Amin, Hamza Aldabbas, and Bader Alouffi. "Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography." Electronics 11, no. 7 (2022): 1026. http://dx.doi.org/10.3390/electronics11071026.
Full textNeef, Sylvia K., Nicole Janssen, Stefan Winter, et al. "Metabolic Drug Response Phenotyping in Colorectal Cancer Organoids by LC-QTOF-MS." Metabolites 10, no. 12 (2020): 494. http://dx.doi.org/10.3390/metabo10120494.
Full textBirchall, Martin A., Finbarr O'Connell, Jane Henderson, et al. "Topical Salmeterol Reduces Protein Content of Nasal Lavage Fluid in Response to Allergen and Histamine Challenge: Double-Blind Cross-over Placebo-Controlled Studies in Adults." American Journal of Rhinology 10, no. 4 (1996): 251–56. http://dx.doi.org/10.2500/105065896782103108.
Full textJiang, D., and D. C. Flyer. "Immune response to Moloney murine leukemia virus nonviral, tumor-associated antigens fails to provide in vivo tumor protection." Journal of Immunology 148, no. 3 (1992): 974–80. http://dx.doi.org/10.4049/jimmunol.148.3.974.
Full textAlvarez, Sandy, Jennifer Bartlett, Nicolette Pollock, Jessica Vazquez, Paul McCray, and Edith Porter. "Challenge with Staphylococcus aureus induces a lipid response in newborn piglets." Journal of Immunology 196, no. 1_Supplement (2016): 68.14. http://dx.doi.org/10.4049/jimmunol.196.supp.68.14.
Full textLiu, Hongyu, Leiting Chen, Zahra Davar, and Mohammad Pour. "Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage." JUCS - Journal of Universal Computer Science 21, no. (3) (2015): 473–82. https://doi.org/10.3217/jucs-021-03-0473.
Full textSu, S. D., M. M. Ward, M. A. Apicella, and R. E. Ward. "The primary B cell response to the O/core region of bacterial lipopolysaccharide is restricted to the Ly-1 lineage." Journal of Immunology 146, no. 1 (1991): 327–31. http://dx.doi.org/10.4049/jimmunol.146.1.327.
Full textGuzmán-López, María H., Susana Sánchez-León, Miriam Marín-Sanz, et al. "Oral Consumption of Bread from an RNAi Wheat Line with Strongly Silenced Gliadins Elicits No Immunogenic Response in a Pilot Study with Celiac Disease Patients." Nutrients 13, no. 12 (2021): 4548. http://dx.doi.org/10.3390/nu13124548.
Full textSorkness, R., K. Johns, W. L. Castleman, and R. F. Lemanske. "Late pulmonary allergic responses in actively but not passively IgE-sensitized rats." Journal of Applied Physiology 69, no. 3 (1990): 1012–21. http://dx.doi.org/10.1152/jappl.1990.69.3.1012.
Full textAnanda, Pratama, Bambang Pujo Semedi, Christrijogo Sumartono Waloejo, and Arie Utariani. "Opioid-Sparring and Multimodal Analgesia as Parts of Enhanced Recovery After Surgery (ERAS) Applied In The Ksatria Airlangga Floating Hospital." Indonesian Journal of Anesthesiology and Reanimation 3, no. 1 (2021): 17. http://dx.doi.org/10.20473/ijar.v3i12021.17-21.
Full textDeng, Xia, Junbin Shao, Le Chang, and Junbin Liang. "A Blockchain-Based Authentication Protocol Using Cryptocurrency Technology in LEO Satellite Networks." Electronics 10, no. 24 (2021): 3151. http://dx.doi.org/10.3390/electronics10243151.
Full textKraemer, W. J., J. E. Dziados, L. J. Marchitelli, et al. "Effects of different heavy-resistance exercise protocols on plasma beta-endorphin concentrations." Journal of Applied Physiology 74, no. 1 (1993): 450–59. http://dx.doi.org/10.1152/jappl.1993.74.1.450.
Full textTanner, Ernest, Ji Tae Choung, J. Swarts, Christine De Vos, and Philip Fireman. "Effect of Topical ucb 28754 on Rhinitis Provoked by Intranasal Histamine and Ascaris Suum in the Monkey." American Journal of Rhinology 10, no. 1 (1996): 45–50. http://dx.doi.org/10.2500/105065896781795102.
Full text