Skip to search formSkip to main contentSkip to account menu

Reflection attack

In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
A recent trend known as NFV attempts to replace dedicated hardware appliances with generic compute, storage, and network… 
2016
2016
Quantum communication protocols are establishing novel methodologies to provide secure environments for transmitting and… 
2015
2015
Our research problem is that there are a large number of successful network reflection DDoS attacks. Via a UDP Reflection Attack… 
2012
2012
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible… 
2008
2008
In this paper, we provide a theoretical infrastructure of the reflection attack. In addition, we mount the reflection attack on… 
2007
2007
RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems… 
2006
2006
Designing cryptographic protocols well suited for today's distributed large networks poses great challenges in terms of cost… 
2004
2004
In 2002, Chien et al. proposed an efficient remote user authentication scheme using smart cards. Later, in 2004, W. C. Ku and S… 
2003
2003
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA…