Skip to search formSkip to main contentSkip to account menu

Reflection attack

In computer security, a reflection attack is a method of attacking a challenge-response authentication system that uses the same protocol in both… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
GOST 28147 is a 256-bit key 64-bit block cipher developed by the USSR, later adopted by the Russian government as a national… 
2013
2013
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based… 
2012
2012
Biometric-based authentication systems are widely deployed for person identification. Recently, an improved scheme for flexible… 
2011
2011
In order to cover up attack traces,many technologies are adopted by network attackers.The most important one is concealing… 
2010
2010
The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact… 
2008
2008
In this paper, we provide a theoretical infrastructure of the reflection attack. In addition, we mount the reflection attack on… 
2007
2007
RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems… 
2007
2007
Password authentication is widely used in e-business because of its inexpensiveness, easy implementation, and user-friendliness… 
2005
2005
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the… 
2003
2003
Recently, Yeh and Sun proposed a simple authenticated key agreement protocol resistant to password guessing attacks called SAKA…