The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Challenge-Response (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (17) 2005-2006 (23) 2007 (15) 2008 (25) 2009-2011 (23) 2012-2014 (20) 2015-2017 (17) 2018-2020 (23) 2021-2023 (23) 2024 (1)
Publication types (Num. hits)
article(54) incollection(5) inproceedings(128)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 131 occurrences of 86 keywords

Results
Found 187 publication records. Showing 187 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
52Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, RFID system, Challenge-Response
46Junzhou Luo, Ming Yang 0001 Analysis of security protocols based on challenge-response. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strand Space Model, network security, protocol analysis, challenge-response
44Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Challenge-response protocols, Parallel repetition with threshold, Direct product theorem
44Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey Information-Theoretic Security Analysis of Physical Uncloneable Functions. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF speckle pattern, Challenge-Response Pair, entropy, Physical Uncloneable Function
37Yu Zhang, Zang Li, Wade Trappe Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Dong-Guk Han, Tsuyoshi Takagi, Howon Kim 0001, Kyoil Chung New Security Problem in RFID Systems "Tag Killing". Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, Radio frequency identification (RFID), hash chain, challenge-response
35Baris Coskun, Cormac Herley Can "Something You Know" Be Saved?. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, passwords, challenge response
32Helena Rifà-Pous A Secure Mobile-Based Authentication System for e-Banking. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF challenge-response authentication, attacks, mobile security, One-time password
32Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan Let Only the Right One IN: Privacy Management Scheme for Social Network. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy over social networks, preference based authentication, friend verification, challenge response schemes
32Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag
32Boris Skoric, Pim Tuyls, W. Ophey Robust Key Extraction from Physical Uncloneable Functions. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF speckle pattern, Challenge-Response Pair, authentication, noise, error correction, Physical Uncloneable Function
32Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
27Zhiyao Liang, Rakesh M. Verma Complexity of Checking Freshness of Cryptographic Protocols. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Athena, NP-completeness, Cryptographic protocols, undecidability, replay attack, model checker, freshness, challenge response
27Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo 0001 Integration of Legacy Client-Server Applications in a Secure Multi-Tier Architecture. Search on Bibsonomy PDP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Challenge-Response Protocols, CORBA based Architecture, Security, Legacy Systems
26Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior Enhancing an Integer Challenge-Response Protocol. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security
23Ryo Nojima, Kazukuni Kobara, Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Vikram B. Suresh, Raghavan Kumar, Mark A. Anders 0001, Himanshu Kaul, Vivek De, Sanu Mathew A 0.26% BER, 1028 Challenge-Response Machine-Learning Resistant Strong-PUF in 14nm CMOS Featuring Stability-Aware Adversarial Challenge Selection. Search on Bibsonomy VLSI Circuits The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Vikram B. Suresh, Raghavan Kumar, Sanu Mathew INVITED: A 0.26% BER, Machine-Learning Resistant 1028 Challenge-Response PUF in 14nm CMOS Featuring Stability-Aware Adversarial Challenge Selection. Search on Bibsonomy DAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Rolf Oppliger, Ralf Hauser Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone SC@CCO: a Graphic-Based Authentication System. Search on Bibsonomy EUROSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password
17Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
14Vipul Goyal, Virendra Kumar, Mayank Singh 0002, Ajith Abraham, Sugata Sanyal CompChall: Addressing Password Guessing Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Patanjali SLPSK, Abhishek Anil Nair, Chester Rebeiro, Swarup Bhunia SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Derek Groen, Diana Suleimenova, Alireza Jahani, Yani Xue Facilitating simulation development for global challenge response and anticipation in a timely way. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Shefali Goel, Abhishek Verma, Vinod Kumar Jain CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Md. Sakibur Sajal, Marc Dandin Challenge-Response Pair Space Enhancement for Imager-Based Physically Unclonable Functions. Search on Bibsonomy MWSCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Basel Abdeen, Ehab Al-Shaer, Waseem G. Shadid VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification. Search on Bibsonomy CNS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Connor Dickey, Christopher Smith, Quentin Johnson 0001, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li 0003 Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. Search on Bibsonomy ICNC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Mona Alkanhal, Abdulaziz Alali, Mohamed F. Younis PUF-Based Authentication Protocol with Physical Layer-Based Obfuscated Challenge-Response Pair. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Francesco Mazzo, Stefano Tomasin, Hongliang Zhang 0001, Arsenia Chorti, H. Vincent Poor Physical-Layer Challenge-Response Authentication for Drone Networks. Search on Bibsonomy GLOBECOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14M. A. Moyeen, Kuljeet Kaur, Anjali Agarwal, Ricardo Manzano S., Marzia Zaman, Nishith Goel FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks. Search on Bibsonomy GLOBECOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Mieszko Ferens, Edlira Dushku, Sokol Kosta Securing PUFs Against ML Modeling Attacks via an Efficient Challenge-Response Approach. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
14Nikolai Ilinykh, Simon Dobnik The VDG Challenge: Response Generation and Evaluation in Collaborative Visual Dialogue. Search on Bibsonomy INLG (Generation Challenges) The full citation details ... 2023 DBLP  BibTeX  RDF
14Stefano Tomasin, Hongliang Zhang 0001, Arsenia Chorti, H. Vincent Poor Challenge-Response Physical Layer Authentication over Partially Controllable Channels. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Lu Lu 0013, Taegeun Yoo, Tony Tae-Hyoung Kim A 6T SRAM Based Two-Dimensional Configurable Challenge-Response PUF for Portable Devices. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Lu Lu 0013, Tony Tae-Hyoung Kim A High Reliable SRAM-Based PUF With Enhanced Challenge-Response Space. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Erwin Haasnoot, Luuk J. Spreeuwers, Raymond N. J. Veldhuis Presentation attack detection and biometric recognition in a challenge-response formalism. Search on Bibsonomy EURASIP J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Govind Mittal, Jiraphon Yenphraphai, Chinmay Hegde, Nasir D. Memon Gotcha: A Challenge-Response System for Real-Time Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Connor Dickey, Christopher Smith, Quentin Johnson 0001, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li 0003 Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Tobias Schmidbauer, Jörg Keller 0001, Steffen Wendzel Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. Search on Bibsonomy ARES The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
14Chao-Lung Chou Presentation attack detection based on score level fusion and challenge-response technique. Search on Bibsonomy J. Supercomput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14P. L. Chithra, K. Sathya Scanning-to-speech challenge-response authentication test for visually impaired. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Ossama Al-Maliki, Hisham Al-Assam Challenge-response mutual authentication protocol for EMV contactless cards. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Zhangqing He, Chen Wang, Tao Ke, Yuejiao Zhang, Wenjun Cao, Jiuchun Jiang A highly reliable FPGA-based RO PUF with enhanced challenge response pairs resilient to modeling attacks. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Samuel Brezani, Peter Vojtás Aggregation for Flexible Challenge Response. Search on Bibsonomy FQAS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
14Yasuhiro Ogasahara, Yohei Hori, Toshihiro Katashita, Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda, Hanpei Koike Implementation of pseudo-linear feedback shift register-based physical unclonable functions on silicon and sufficient Challenge-Response pair acquisition using Built-In Self-Test before shipping. Search on Bibsonomy Integr. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
14Xiaoshuai Zhang, Chao Liu 0012, Kok Keong Chai, Stefan Poslad A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Victor Takashi Hayashi, Wilson Vicente Ruggiero Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Wenyuan Xu 0001, Jing Tian, Yu Cao 0003, Song Wang 0002 Challenge-Response Authentication Using In-Air Handwriting Style Verification. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Michihiro Shintani, Tomoki Mino, Michiko Inoue LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement. Search on Bibsonomy ATS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Weidong Luo, Bowen Lan, Xinyi Wan, Zhihong Liu, Yong Zeng 0002, Jianfeng Ma 0001 Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel. Search on Bibsonomy ICCT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Mohamed Torky, Ali Meligy, Hani Ibrahim A challenge-response mechanism for securing online social networks against social bots. Search on Bibsonomy Int. J. Ad Hoc Ubiquitous Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Jingjie Li, Kassem Fawaz, Younghyun Kim 0001 Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Yong Jin, Masahiko Tomoishi Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. Search on Bibsonomy COMPSAC (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Lu Lu 0013, Tony Tae-Hyoung Kim A Sequence-Dependent Configurable PUF Based on 6T SRAM for Enhanced Challenge Response Space. Search on Bibsonomy ISCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Seungtae Kim, Yonggu Lee, Jinho Choi 0001, Moongu Jeon, Euiseok Hwang Dynamic Key Update Strategy in Physical-Layer Challenge-Response Authentication. Search on Bibsonomy ICSPCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Brendan Kitts, Andrew Potter Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks. Search on Bibsonomy ISI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Manar Mohamed, Prakash Shrestha, Nitesh Saxena Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. Search on Bibsonomy ACSAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Maria Rona Perez, Bobby D. Gerardo, Ruji Medina Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns. Search on Bibsonomy ICGSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Rami Al-Dalky, Michael Rabinovich, Mark Allman Practical challenge-response for DNS. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Nils Wisiol, Marian Margraf Attacking RO-PUFs with Enhanced Challenge-Response Pairs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
14Nils Wisiol, Marian Margraf Attacking RO-PUFs with Enhanced Challenge-Response Pairs. Search on Bibsonomy SEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Tham Nguyen, Doan Hoang, Aruna Seneviratne Exploring Challenge-Response Mechanism Designs for IoT Initial Trust Establishment. Search on Bibsonomy ICC Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Horacio L. França, Charles B. Prado, Vinay C. Patil, Sandip Kundu Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs. Search on Bibsonomy AsianHOST The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Rami Al-Dalky, Michael Rabinovich, Mark Allman Practical Challenge-Response for DNS. Search on Bibsonomy ANRW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Mani Khavari, Sebastian Baur, Holger Boche Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs. Search on Bibsonomy CNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Salem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Subaschandrabose, Zilong Ye Secure the internet of things with challenge response authentication in fog computing. Search on Bibsonomy IPCCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Qianying Tang, Chen Zhou, Woong Choi, Gyuseong Kang, Jongsun Park 0001, Keshab K. Parhi, Chris H. Kim A DRAM based physical unclonable function capable of generating >1032 Challenge Response Pairs per 1Kbit array for secure chip authentication. Search on Bibsonomy CICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Chen Zhou, Keshab K. Parhi, Chris H. Kim Secure and Reliable XOR Arbiter PUF Design: An Experimental Study based on 1 Trillion Challenge Response Pair Measurements. Search on Bibsonomy DAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Xiaofu Wu, Zhen Yang 0001, Cong Ling 0001, Xiang-Gen Xia 0001 Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
14Alexey Melnikov 0001 Salted Challenge Response HTTP Authentication Mechanism. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Dan Zhang, Xiaofu Wu, Jun Yan 0006, Wei-Ping Zhu 0001 PHY-CRAM物理层激励响应认证机制的性能分析 (Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Abhishek Kumar, Ravi Shankar Mishra, K. R. Kashwan Challenge-response generation using RO-PUF with reduced hardware. Search on Bibsonomy ICACCI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic Using Reflexive Eye Movements for Fast Challenge-Response Authentication. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen A challenge-response authentication for RFID using Enhanced-Trivium. Search on Bibsonomy SSIC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Yansong Gao, Gefei Li 0001, Hua Ma, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott, Damith Chinthana Ranasinghe Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. Search on Bibsonomy PerCom Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Tham Nguyen, Doan Hoang, Aruna Seneviratne Challenge-response trust assessment model for personal space IoT. Search on Bibsonomy PerCom Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong Challenge response interaction for biometric liveness establishment and template protection. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Giray Kömürcü, Ali Emre Pusane, Günhan Dündar Enhanced challenge-response set and secure usage scenarios for ordering-based ring oscillator-physical unclonable functions. Search on Bibsonomy IET Circuits Devices Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. Search on Bibsonomy DATE The full citation details ... 2015 DBLP  BibTeX  RDF
14Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru, Takeshi Sugawara 0001, Mitsuru Shiozaki, Takeshi Fujino Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Yossi Gilad, Amir Herzberg, Haya Schulmann Off-Path Hacking: The Illusion of Challenge-Response Authentication. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Daniel E. Holcomb, Kevin Fu Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
14Raphael Amoah, Suriadi Suriadi, Seyit Ahmet Çamtepe, Ernest Foo Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Chaohui Du, Guoqiang Bai 0001 A Novel Technique for Ring Oscillator Based PUFs to Enroll Stable Challenge Response Pairs. Search on Bibsonomy CIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Xianru Du, Dan Shan, Kai Zeng 0001, Lauren M. Huie Physical layer challenge-response authentication in wireless networks with relay. Search on Bibsonomy INFOCOM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Daniel E. Holcomb, Kevin Fu Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. Search on Bibsonomy CHES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. Search on Bibsonomy WISEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Dan Shan, Kai Zeng 0001, Weidong Xiang, Paul C. Richardson, Yan Dong 0001 PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Yossi Gilad, Amir Herzberg, Haya Schulmann Off-Path Hacking: The Illusion of Challenge-Response Authentication Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
14Yossi Gilad, Amir Herzberg, Haya Schulmann Off-Path Hacking: The Illusion of Challenge-Response Authentication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
14Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. Search on Bibsonomy Inf. Technol. Control. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Haruhiko Fujii, Yukio Tsuruoka Three-Factor User Authentication Method Using Biometrics Challenge Response. Search on Bibsonomy Financial Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Dekai Wu, Karteek Addanki, Markus Saers Freestyle: a challenge-response system for hip hop lyrics via unsupervised induction of stochastic transduction grammars. Search on Bibsonomy INTERSPEECH The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Haruhiko Fujii, Yukio Tsuruoka SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 187 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license