Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,922,541 papers from all fields of science
Search
Sign In
Create Free Account
Reflection attack
In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Challenge–response authentication
Computer security
Cryptographic nonce
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Supporting virtualized network functions with stateful data plane abstraction
J. Bi
,
Shuyong Zhu
,
Chen Sun
,
Guang Yao
,
Hongxin Hu
IEEE Network
2016
Corpus ID: 10668830
A recent trend known as NFV attempts to replace dedicated hardware appliances with generic compute, storage, and network…
Expand
2016
2016
Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications
Saleh Almousa
,
M. Barbeau
IEEE Globecom Workshops (GC Wkshps)
2016
Corpus ID: 1153008
Quantum communication protocols are establishing novel methodologies to provide secure environments for transmitting and…
Expand
2015
2015
Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks
Todd Booth
,
K. Andersson
Journal of Internet Services and Information…
2015
Corpus ID: 17698830
Our research problem is that there are a large number of successful network reflection DDoS attacks. Via a UDP Reflection Attack…
Expand
2012
2012
A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME
Eunjun Yoon
,
K. Yoo
2012
Corpus ID: 17565826
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible…
Expand
2011
2011
Analysis and improvement of an authenticated multiple key exchange protocol
Qingfeng Cheng
,
Chuan-gui Ma
Computers & electrical engineering
2011
Corpus ID: 43451334
2008
2008
Reflection Cryptanalysis of Some Ciphers
Noen Given
2008
Corpus ID: 16207506
In this paper, we provide a theoretical infrastructure of the reflection attack. In addition, we mount the reflection attack on…
Expand
2007
2007
RFID Mutual Authentication Protocol Against Reflection Attack
Baehyun Kim
,
I. Ryoo
2007
Corpus ID: 126539442
RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems…
Expand
2006
2006
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards
Youngsook Lee
,
Junghyun Nam
,
Dongho Won
OTM Workshops
2006
Corpus ID: 18273804
Designing cryptographic protocols well suited for today's distributed large networks poses great challenges in terms of cost…
Expand
2004
2004
On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards.
Manoj Kumar
2004
Corpus ID: 14281812
In 2002, Chien et al. proposed an efficient remote user authentication scheme using smart cards. Later, in 2004, W. C. Ku and S…
Expand
2003
2003
Parallizable simple authenticated key agreement protocol
Sung-Woon Lee
,
Woo-Hun Kim
,
Hyun-Sung Kim
,
K. Yoo
OPSR
2003
Corpus ID: 11953308
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE