|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 131 occurrences of 86 keywords
|
|
|
Results
Found 187 publication records. Showing 187 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
52 | Keunwoo Rhee, Jin Kwak, Seungjoo Kim, Dongho Won |
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 70-84, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, RFID system, Challenge-Response |
46 | Junzhou Luo, Ming Yang 0001 |
Analysis of security protocols based on challenge-response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(2), pp. 137-153, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strand Space Model, network security, protocol analysis, challenge-response |
44 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(1), pp. 75-92, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Challenge-response protocols, Parallel repetition with threshold, Direct product theorem |
44 | Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M. Akkermans, W. Ophey |
Information-Theoretic Security Analysis of Physical Uncloneable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 141-155, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
speckle pattern, Challenge-Response Pair, entropy, Physical Uncloneable Function |
37 | Yu Zhang, Zang Li, Wade Trappe |
Evaluation of Localization Attacks on Power-Modulated Challenge-Response Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(2), pp. 259-272, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Dong-Guk Han, Tsuyoshi Takagi, Howon Kim 0001, Kyoil Chung |
New Security Problem in RFID Systems "Tag Killing". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 375-384, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, Radio frequency identification (RFID), hash chain, challenge-response |
35 | Baris Coskun, Cormac Herley |
Can "Something You Know" Be Saved?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 421-440, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, passwords, challenge response |
32 | Helena Rifà-Pous |
A Secure Mobile-Based Authentication System for e-Banking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part II, pp. 848-860, 2009, Springer, 978-3-642-05150-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
challenge-response authentication, attacks, mobile security, One-time password |
32 | Nagaraja Kaushik Gampa, Rohit Ashok Khot, Kannan Srinathan |
Let Only the Right One IN: Privacy Management Scheme for Social Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 310-317, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy over social networks, preference based authentication, friend verification, challenge response schemes |
32 | Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang |
Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 634-643, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag |
32 | Boris Skoric, Pim Tuyls, W. Ophey |
Robust Key Extraction from Physical Uncloneable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 407-422, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
speckle pattern, Challenge-Response Pair, authentication, noise, error correction, Physical Uncloneable Function |
32 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 357-370, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
27 | Zhiyao Liang, Rakesh M. Verma |
Complexity of Checking Freshness of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 86-101, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Athena, NP-completeness, Cryptographic protocols, undecidability, replay attack, model checker, freshness, challenge response |
27 | Domenico Cotroneo, Antonino Mazzeo, Luigi Romano, Stefano Russo 0001 |
Integration of Legacy Client-Server Applications in a Secure Multi-Tier Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: 10th Euromicro Workshop on Parallel, Distributed and Network-Based Processing (PDP 2002), 9-11 January 2002, Canary Islands, Spain, pp. 269-276, 2002, IEEE Computer Society, 0-7695-1444-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Challenge-Response Protocols, CORBA based Architecture, Security, Legacy Systems |
26 | Robson de Oliveira Albuquerque, Luis Javier García-Villalba, Rafael Timóteo de Sousa Júnior |
Enhancing an Integer Challenge-Response Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part II, pp. 526-540, 2008, Springer, 978-3-540-69840-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Spontaneous Self-Organized Networks, Peer Identification, Identification Protocol, Trust, Information Security |
23 | Ryo Nojima, Kazukuni Kobara, Hideki Imai |
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 303-316, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Vikram B. Suresh, Raghavan Kumar, Mark A. Anders 0001, Himanshu Kaul, Vivek De, Sanu Mathew |
A 0.26% BER, 1028 Challenge-Response Machine-Learning Resistant Strong-PUF in 14nm CMOS Featuring Stability-Aware Adversarial Challenge Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Circuits ![In: IEEE Symposium on VLSI Circuits, VLSI Circuits 2020, Honolulu, HI, USA, June 16-19, 2020, pp. 1-2, 2020, IEEE, 978-1-7281-9942-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Vikram B. Suresh, Raghavan Kumar, Sanu Mathew |
INVITED: A 0.26% BER, Machine-Learning Resistant 1028 Challenge-Response PUF in 14nm CMOS Featuring Stability-Aware Adversarial Challenge Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: 57th ACM/IEEE Design Automation Conference, DAC 2020, San Francisco, CA, USA, July 20-24, 2020, pp. 1-3, 2020, IEEE, 978-1-7281-1085-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Rolf Oppliger, Ralf Hauser |
Protecting TLS-SA implementations for the challenge-response feature of EMV-CAP against challenge collision attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 1(2), pp. 125-134, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Rosalia D'Alessandro, Marco Ghirardi, Manuel Leone |
SC@CCO: a Graphic-Based Authentication System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the First European Workshop on System Security, EUROSEC 2008, Glasgow, Scotland, UK, March 31, 2008, pp. 8-15, 2008, ACM, 978-1-60558-119-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data matrix, graphic authentication and authorization system, security, access control, barcode, anti-phishing, one-time password |
17 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 500-516, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 290-307, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision |
14 | Vipul Goyal, Virendra Kumar, Mayank Singh 0002, Ajith Abraham, Sugata Sanyal |
CompChall: Addressing Password Guessing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 739-744, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Govind Mittal, Arthur Jakobsson, Kelly O. Marshall, Chinmay Hegde, Nasir D. Memon |
AI-assisted Tagging of Deepfake Audio Calls using Challenge-Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.18085, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
14 | Patanjali SLPSK, Abhishek Anil Nair, Chester Rebeiro, Swarup Bhunia |
SIGNED: A Challenge-Response Scheme for Electronic Hardware Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 72(6), pp. 1763-1777, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Derek Groen, Diana Suleimenova, Alireza Jahani, Yani Xue |
Facilitating simulation development for global challenge response and anticipation in a timely way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. ![In: J. Comput. Sci. 72, pp. 102107, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Shefali Goel, Abhishek Verma, Vinod Kumar Jain |
CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 132, pp. 103346, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Md. Sakibur Sajal, Marc Dandin |
Challenge-Response Pair Space Enhancement for Imager-Based Physically Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWSCAS ![In: 66th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2023, Tempe, AZ, USA, August 6-9, 2023, pp. 217-221, 2023, IEEE, 979-8-3503-0210-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Basel Abdeen, Ehab Al-Shaer, Waseem G. Shadid |
VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-3945-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Connor Dickey, Christopher Smith, Quentin Johnson 0001, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li 0003 |
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC ![In: International Conference on Computing, Networking and Communications, ICNC 2023, Honolulu, HI, USA, February 20-22, 2023, pp. 54-60, 2023, IEEE, 978-1-6654-5719-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Mona Alkanhal, Abdulaziz Alali, Mohamed F. Younis |
PUF-Based Authentication Protocol with Physical Layer-Based Obfuscated Challenge-Response Pair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023, pp. 5867-5872, 2023, IEEE, 978-1-5386-7462-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Francesco Mazzo, Stefano Tomasin, Hongliang Zhang 0001, Arsenia Chorti, H. Vincent Poor |
Physical-Layer Challenge-Response Authentication for Drone Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pp. 3282-3287, 2023, IEEE, 979-8-3503-1090-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | M. A. Moyeen, Kuljeet Kaur, Anjali Agarwal, Ricardo Manzano S., Marzia Zaman, Nishith Goel |
FedChallenger: Challenge-Response-Based Defence for Federated Learning Against Byzantine Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2023, Kuala Lumpur, Malaysia, December 4-8, 2023, pp. 3843-3848, 2023, IEEE, 979-8-3503-1090-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Mieszko Ferens, Edlira Dushku, Sokol Kosta |
Securing PUFs Against ML Modeling Attacks via an Efficient Challenge-Response Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM Workshops ![In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshop, Hoboken, NJ, USA, May 20, 2023, pp. 1-6, 2023, IEEE, 978-1-6654-9427-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
14 | Nikolai Ilinykh, Simon Dobnik |
The VDG Challenge: Response Generation and Evaluation in Collaborative Visual Dialogue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INLG (Generation Challenges) ![In: Proceedings of the 16th International Natural Language Generation Conference, INLG 2023 - Generation Challenges, Prague, Czechia, September 11 - 15, 2023, pp. 23-30, 2023, Association for Computational Linguistics, 979-8-89176-003-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
14 | Stefano Tomasin, Hongliang Zhang 0001, Arsenia Chorti, H. Vincent Poor |
Challenge-Response Physical Layer Authentication over Partially Controllable Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 60(12), pp. 138-144, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Lu Lu 0013, Taegeun Yoo, Tony Tae-Hyoung Kim |
A 6T SRAM Based Two-Dimensional Configurable Challenge-Response PUF for Portable Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. I Regul. Pap. ![In: IEEE Trans. Circuits Syst. I Regul. Pap. 69(6), pp. 2542-2552, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Lu Lu 0013, Tony Tae-Hyoung Kim |
A High Reliable SRAM-Based PUF With Enhanced Challenge-Response Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. II Express Briefs ![In: IEEE Trans. Circuits Syst. II Express Briefs 69(2), pp. 589-593, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Erwin Haasnoot, Luuk J. Spreeuwers, Raymond N. J. Veldhuis |
Presentation attack detection and biometric recognition in a challenge-response formalism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EURASIP J. Inf. Secur. ![In: EURASIP J. Inf. Secur. 2022(1), pp. 5, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Govind Mittal, Jiraphon Yenphraphai, Chinmay Hegde, Nasir D. Memon |
Gotcha: A Challenge-Response System for Real-Time Deepfake Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.06186, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Connor Dickey, Christopher Smith, Quentin Johnson 0001, Jingcheng Li, Ziqi Xu, Loukas Lazos, Ming Li 0003 |
Wiggle: Physical Challenge-Response Verification of Vehicle Platooning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.00080, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Tobias Schmidbauer, Jörg Keller 0001, Steffen Wendzel |
Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022, pp. 50:1-50:10, 2022, ACM, 978-1-4503-9670-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
14 | Chao-Lung Chou |
Presentation attack detection based on score level fusion and challenge-response technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 77(5), pp. 4681-4697, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | P. L. Chithra, K. Sathya |
Scanning-to-speech challenge-response authentication test for visually impaired. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 92, pp. 107133, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Ossama Al-Maliki, Hisham Al-Assam |
Challenge-response mutual authentication protocol for EMV contactless cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 103, pp. 102186, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Zhangqing He, Chen Wang, Tao Ke, Yuejiao Zhang, Wenjun Cao, Jiuchun Jiang |
A highly reliable FPGA-based RO PUF with enhanced challenge response pairs resilient to modeling attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Electron. Express ![In: IEICE Electron. Express 18(20), pp. 20210350, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Samuel Brezani, Peter Vojtás |
Aggregation for Flexible Challenge Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FQAS ![In: Flexible Query Answering Systems - 14th International Conference, FQAS 2021, Bratislava, Slovakia, September 19-24, 2021, Proceedings, pp. 209-222, 2021, Springer, 978-3-030-86966-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
14 | Yasuhiro Ogasahara, Yohei Hori, Toshihiro Katashita, Tomoki Iizuka, Hiromitsu Awano, Makoto Ikeda, Hanpei Koike |
Implementation of pseudo-linear feedback shift register-based physical unclonable functions on silicon and sufficient Challenge-Response pair acquisition using Built-In Self-Test before shipping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integr. ![In: Integr. 71, pp. 144-153, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Abhishek Nair, Patanjali SLPSK, Chester Rebeiro, Swarup Bhunia |
SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.05209, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
14 | Xiaoshuai Zhang, Chao Liu 0012, Kok Keong Chai, Stefan Poslad |
A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(17), pp. 4681, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Victor Takashi Hayashi, Wilson Vicente Ruggiero |
Non-Invasive Challenge Response Authentication for Voice Transactions with Smart Home Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(22), pp. 6563, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Wenyuan Xu 0001, Jing Tian, Yu Cao 0003, Song Wang 0002 |
Challenge-Response Authentication Using In-Air Handwriting Style Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 17(1), pp. 51-64, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Michihiro Shintani, Tomoki Mino, Michiko Inoue |
LBIST-PUF: An LBIST Scheme Towards Efficient Challenge-Response Pairs Collection and Machine-Learning Attack Tolerance Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATS ![In: 29th IEEE Asian Test Symposium, ATS 2020, Penang, Malaysia, November 23-26, 2020, pp. 1-6, 2020, IEEE, 978-1-7281-7467-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Weidong Luo, Bowen Lan, Xinyi Wan, Zhihong Liu, Yong Zeng 0002, Jianfeng Ma 0001 |
Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCT ![In: 20th IEEE International Conference on Communication Technology, ICCT 2020, Nanning, China, October 28-31, 2020, pp. 1089-1096, 2020, IEEE, 978-1-7281-8141-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
14 | Mohamed Torky, Ali Meligy, Hani Ibrahim |
A challenge-response mechanism for securing online social networks against social bots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Ad Hoc Ubiquitous Comput. ![In: Int. J. Ad Hoc Ubiquitous Comput. 32(1), pp. 1-13, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Jingjie Li, Kassem Fawaz, Younghyun Kim 0001 |
Velody: Nonlinear Vibration Challenge-Response for Resilient User Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019., pp. 1201-1213, 2019, ACM, 978-1-4503-6747-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Yong Jin, Masahiko Tomoishi |
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 43rd IEEE Annual Computer Software and Applications Conference, COMPSAC 2019, Milwaukee, WI, USA, July 15-19, 2019, Volume 2, pp. 676-681, 2019, IEEE, 978-1-7281-2607-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Lu Lu 0013, Tony Tae-Hyoung Kim |
A Sequence-Dependent Configurable PUF Based on 6T SRAM for Enhanced Challenge Response Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: IEEE International Symposium on Circuits and Systems, ISCAS 2019, Sapporo, Japan, May 26-29, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-0397-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Seungtae Kim, Yonggu Lee, Jinho Choi 0001, Moongu Jeon, Euiseok Hwang |
Dynamic Key Update Strategy in Physical-Layer Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSPCS ![In: 13th International Conference on Signal Processing and Communication Systems, ICSPCS 2019, Gold Coast, Australia, December 16-18, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-2194-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Brendan Kitts, Andrew Potter |
Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: 2019 IEEE International Conference on Intelligence and Security Informatics, ISI 2019, Shenzhen, China, July 1-3, 2019, pp. 24-29, 2019, IEEE, 978-1-7281-2504-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Manar Mohamed, Prakash Shrestha, Nitesh Saxena |
Challenge-response behavioral mobile authentication: a comparative study of graphical patterns and cognitive games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019, pp. 355-365, 2019, ACM, 978-1-4503-7628-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Maria Rona Perez, Bobby D. Gerardo, Ruji Medina |
Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGSP ![In: Proceedings of the 3rd International Conference on Graphics and Signal Processing, ICGSP 2019, Hong Kong, SAR, China, June 1 - 3, 2019, pp. 58-61, 2019, ACM, 978-1-4503-7146-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
14 | Rami Al-Dalky, Michael Rabinovich, Mark Allman |
Practical challenge-response for DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 48(3), pp. 20-28, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Nils Wisiol, Marian Margraf |
Attacking RO-PUFs with Enhanced Challenge-Response Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 862, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
14 | Nils Wisiol, Marian Margraf |
Attacking RO-PUFs with Enhanced Challenge-Response Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 33rd IFIP TC 11 International Conference, SEC 2018, Held at the 24th IFIP World Computer Congress, WCC 2018, Poznan, Poland, September 18-20, 2018, Proceedings, pp. 122-126, 2018, Springer, 978-3-319-99827-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Tham Nguyen, Doan Hoang, Aruna Seneviratne |
Exploring Challenge-Response Mechanism Designs for IoT Initial Trust Establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC Workshops ![In: 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018, Kansas City, MO, USA, May 20-24, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4328-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Horacio L. França, Charles B. Prado, Vinay C. Patil, Sandip Kundu |
Defeating Strong PUF Modeling Attack via Adverse Selection of Challenge-Response Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsianHOST ![In: Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2018, Hong Kong, China, December 17-18, 2018, pp. 25-30, 2018, IEEE, 978-1-5386-7471-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Rami Al-Dalky, Michael Rabinovich, Mark Allman |
Practical Challenge-Response for DNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANRW ![In: Proceedings of the Applied Networking Research Workshop, ANRW 2018, Montreal, QC, Canada, July 16-16, 2018, pp. 74, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
14 | Mani Khavari, Sebastian Baur, Holger Boche |
Optimal capacity region for PUF-based authentication with a constraint on the number of challenge-response pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, October 9-11, 2017, pp. 575-579, 2017, IEEE, 978-1-5386-0683-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Salem Alharbi, Peter Rodriguez, Rajaputhri Maharaja, Prashant Iyer, Nivethitha Subaschandrabose, Zilong Ye |
Secure the internet of things with challenge response authentication in fog computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: 36th IEEE International Performance Computing and Communications Conference, IPCCC 2017, San Diego, CA, USA, December 10-12, 2017, pp. 1-2, 2017, IEEE Computer Society, 978-1-5090-6468-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Qianying Tang, Chen Zhou, Woong Choi, Gyuseong Kang, Jongsun Park 0001, Keshab K. Parhi, Chris H. Kim |
A DRAM based physical unclonable function capable of generating >1032 Challenge Response Pairs per 1Kbit array for secure chip authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICC ![In: 2017 IEEE Custom Integrated Circuits Conference, CICC 2017, Austin, TX, USA, April 30 - May 3, 2017, pp. 1-4, 2017, IEEE, 978-1-5090-5191-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Chen Zhou, Keshab K. Parhi, Chris H. Kim |
Secure and Reliable XOR Arbiter PUF Design: An Experimental Study based on 1 Trillion Challenge Response Pair Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 54th Annual Design Automation Conference, DAC 2017, Austin, TX, USA, June 18-22, 2017, pp. 10:1-10:6, 2017, ACM, 978-1-4503-4927-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
14 | Xiaofu Wu, Zhen Yang 0001, Cong Ling 0001, Xiang-Gen Xia 0001 |
Artificial-Noise-Aided Physical Layer Phase Challenge-Response Authentication for Practical OFDM Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 15(10), pp. 6611-6625, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava |
Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1605.02062, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
14 | Alexey Melnikov 0001 |
Salted Challenge Response HTTP Authentication Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 7804, pp. 1-18, March 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Dan Zhang, Xiaofu Wu, Jun Yan 0006, Wei-Ping Zhu 0001 |
PHY-CRAM物理层激励响应认证机制的性能分析 (Performance Analysis of PHY-CRAM Physical Layer Challenge Response Authentication Mechanism). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(2), pp. 188-191, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Abhishek Kumar, Ravi Shankar Mishra, K. R. Kashwan |
Challenge-response generation using RO-PUF with reduced hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACCI ![In: 2016 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2016, Jaipur, India, September 21-24, 2016, pp. 1305-1308, 2016, IEEE, 978-1-5090-2029-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Ivo Sluganovic, Marc Roeschlin, Kasper Bonne Rasmussen, Ivan Martinovic |
Using Reflexive Eye Movements for Fast Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 1056-1067, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Siye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen |
A challenge-response authentication for RFID using Enhanced-Trivium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIC ![In: International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC 2016, Paris, France, July 18-19, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-2470-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Yansong Gao, Gefei Li 0001, Hua Ma, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott, Damith Chinthana Ranasinghe |
Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-1941-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Tham Nguyen, Doan Hoang, Aruna Seneviratne |
Challenge-response trust assessment model for personal space IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-1941-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong |
Challenge response interaction for biometric liveness establishment and template protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, December 12-14, 2016, pp. 698-701, 2016, IEEE, 978-1-5090-4379-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
14 | Giray Kömürcü, Ali Emre Pusane, Günhan Dündar |
Enhanced challenge-response set and secure usage scenarios for ordering-based ring oscillator-physical unclonable functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Circuits Devices Syst. ![In: IET Circuits Devices Syst. 9(2), pp. 87-95, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Yasser Shoukry, Paul Martin 0008, Yair Yona, Suhas N. Diggavi, Mani B. Srivastava |
PyCRA: Physical Challenge-Response Authentication For Active Sensors Under Spoofing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 1004-1015, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
14 | Phuong Ha Nguyen, Durga Prasad Sahoo, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay |
Efficient attacks on robust ring oscillator PUF with enhanced challenge-response set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, DATE 2015, Grenoble, France, March 9-13, 2015, pp. 641-646, 2015, ACM, 978-3-9815370-4-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
14 | Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru, Takeshi Sugawara 0001, Mitsuru Shiozaki, Takeshi Fujino |
Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1), pp. 264-274, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Yossi Gilad, Amir Herzberg, Haya Schulmann |
Off-Path Hacking: The Illusion of Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 12(5), pp. 68-77, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Daniel E. Holcomb, Kevin Fu |
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 749, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
14 | Raphael Amoah, Suriadi Suriadi, Seyit Ahmet Çamtepe, Ernest Foo |
Security analysis of the non-aggressive challenge response of the DNP3 protocol using a CPN model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014, pp. 827-833, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Chaohui Du, Guoqiang Bai 0001 |
A Novel Technique for Ring Oscillator Based PUFs to Enroll Stable Challenge Response Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 14th IEEE International Conference on Computer and Information Technology, CIT 2014, Xi'an, China, September 11-13, 2014, pp. 270-275, 2014, IEEE Computer Society, 978-1-4799-6238-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Xianru Du, Dan Shan, Kai Zeng 0001, Lauren M. Huie |
Physical layer challenge-response authentication in wireless networks with relay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2014 IEEE Conference on Computer Communications, INFOCOM 2014, Toronto, Canada, April 27 - May 2, 2014, pp. 1276-1284, 2014, IEEE, 978-14799-3360-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Daniel E. Holcomb, Kevin Fu |
Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings, pp. 510-526, 2014, Springer, 978-3-662-44708-6. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Pieter Robyns, Bram Bonné, Peter Quax, Wim Lamotte |
Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014, pp. 189-194, 2014, ACM, 978-1-4503-2972-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
14 | Dan Shan, Kai Zeng 0001, Weidong Xiang, Paul C. Richardson, Yan Dong 0001 |
PHY-CRAM: Physical Layer Challenge-Response Authentication Mechanism for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 31(9), pp. 1817-1827, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Yossi Gilad, Amir Herzberg, Haya Schulmann |
Off-Path Hacking: The Illusion of Challenge-Response Authentication ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1305.0854, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
14 | Yossi Gilad, Amir Herzberg, Haya Schulmann |
Off-Path Hacking: The Illusion of Challenge-Response Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 623, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
14 | Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu |
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Technol. Control. ![In: Inf. Technol. Control. 42(2), pp. 124-130, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Haruhiko Fujii, Yukio Tsuruoka |
Three-Factor User Authentication Method Using Biometrics Challenge Response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers, pp. 395-396, 2013, Springer, 978-3-642-39883-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Dekai Wu, Karteek Addanki, Markus Saers |
Freestyle: a challenge-response system for hip hop lyrics via unsupervised induction of stochastic transduction grammars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERSPEECH ![In: INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013, pp. 3478-3482, 2013, ISCA. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
14 | Haruhiko Fujii, Yukio Tsuruoka |
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013, pp. 283-287, 2013, IEEE, 978-1-908320-20-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 187 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|