Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,808,552 papers from all fields of science
Search
Sign In
Create Free Account
Reflection attack
In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Authentication
Challenge–response authentication
Computer security
Cryptographic nonce
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Cryptanalysis of GOST 2
T. Ashur
,
Achiya Bar-On
,
O. Dunkelman
2017
Corpus ID: 44041323
GOST 28147 is a 256-bit key 64-bit block cipher developed by the USSR, later adopted by the Russian government as a national…
Expand
2013
2013
Dynamic Encryption Key based Smart Card Authentication Scheme
Ravi SinghPippal
,
P. Gupta
,
Rakesh Kumar Singh
2013
Corpus ID: 2209388
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based…
Expand
2012
2012
A ROBUST AND FLEXIBLE BIOMETRICS REMOTE USER AUTHENTICATION SCHEME
Eunjun Yoon
,
K. Yoo
2012
Corpus ID: 17565826
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible…
Expand
2011
2011
Research on Concealing Technology of Network Attack Source
Li Hong-kun
2011
Corpus ID: 63118513
In order to cover up attack traces,many technologies are adopted by network attackers.The most important one is concealing…
Expand
2010
2010
An Improvement of Generalized Key Agreement and Password Authentication Protocol
Lu-Xiong Xu
,
Na Wang
,
Chenglian Liu
International Conference on Multimedia…
2010
Corpus ID: 40295916
The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact…
Expand
2008
2008
Reflection Cryptanalysis of Some Ciphers
Noen Given
2008
Corpus ID: 16207506
In this paper, we provide a theoretical infrastructure of the reflection attack. In addition, we mount the reflection attack on…
Expand
2007
2007
RFID Mutual Authentication Protocol Against Reflection Attack
Baehyun Kim
,
I. Ryoo
2007
Corpus ID: 126539442
RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems…
Expand
2007
2007
An Enhanced Verifier-Free Remote User Password Authentication Scheme
W. Ku
,
Chun-Hao Hwang
,
Hao-Rung Chung
IEEE International Conference on e-Business…
2007
Corpus ID: 195703272
Password authentication is widely used in e-business because of its inexpensiveness, easy implementation, and user-friendliness…
Expand
2005
2005
Mitigating Distributed Denial-of-Service Attack with Deterministic Bit Marking
F. Merat
,
Yingtao Jiang
,
Yoohwan Kim
,
Ju-Yeon Jo
,
Mei Yang
2005
Corpus ID: 17624491
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the…
Expand
2003
2003
Parallizable simple authenticated key agreement protocol
Sung-Woon Lee
,
Woo-Hun Kim
,
Hyun-Sung Kim
,
K. Yoo
OPSR
2003
Corpus ID: 11953308
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required