Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,114,379 papers from all fields of science
Search
Sign In
Create Free Account
Reflection attack
In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Challenge–response authentication
Computer security
Cryptographic nonce
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Supporting virtualized network functions with stateful data plane abstraction
J. Bi
,
Shuyong Zhu
,
Chen Sun
,
Guang Yao
,
Hongxin Hu
IEEE Network
2016
Corpus ID: 10668830
A recent trend known as NFV attempts to replace dedicated hardware appliances with generic compute, storage, and network…
Expand
2016
2016
Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications
Saleh Almousa
,
M. Barbeau
IEEE Globecom Workshops (GC Wkshps)
2016
Corpus ID: 1153008
Quantum communication protocols are establishing novel methodologies to provide secure environments for transmitting and…
Expand
2015
2015
Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks
Todd Booth
,
K. Andersson
Journal of Internet Services and Information…
2015
Corpus ID: 17698830
Our research problem is that there are a large number of successful network reflection DDoS attacks. Via a UDP Reflection Attack…
Expand
2013
2013
Square reflection cryptanalysis of 5-round Feistel networks with permutations
Orhun Kara
Information Processing Letters
2013
Corpus ID: 40230434
2012
2012
A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME
Eunjun Yoon
,
K. Yoo
2012
Corpus ID: 17565826
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible…
Expand
2011
2011
Analysis and improvement of an authenticated multiple key exchange protocol
Qingfeng Cheng
,
Chuan-gui Ma
Computers & electrical engineering
2011
Corpus ID: 43451334
2008
2008
Reflection Cryptanalysis of Some Ciphers
Noen Given
2008
Corpus ID: 16207506
In this paper, we provide a theoretical infrastructure of the reflection attack. In addition, we mount the reflection attack on…
Expand
2007
2007
RFID Mutual Authentication Protocol Against Reflection Attack
Baehyun Kim
,
I. Ryoo
2007
Corpus ID: 126539442
RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems…
Expand
2006
2006
Security Enhancement of a Remote User Authentication Scheme Using Smart Cards
Youngsook Lee
,
Junghyun Nam
,
Dongho Won
OTM Workshops
2006
Corpus ID: 18273804
Designing cryptographic protocols well suited for today's distributed large networks poses great challenges in terms of cost…
Expand
2003
2003
Parallizable simple authenticated key agreement protocol
Sung-Woon Lee
,
Woo-Hun Kim
,
Hyun-Sung Kim
,
K. Yoo
OPSR
2003
Corpus ID: 11953308
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE