Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,083 papers from all fields of science
Search
Sign In
Create Free Account
Spoofing attack
Known as:
Email forging
, GPS spoofing
, Spoof attack
Expand
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARP spoofing
Adversary (cryptography)
Anti-spam techniques
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
GPS spoofing attack characterization and detection in smart grids
P. Pradhan
,
K. Nagananda
,
P. Venkitasubramaniam
,
S. Kishore
,
Rick S. Blum
IEEE Conference on Communications and Network…
2016
Corpus ID: 16139130
The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is…
Expand
2015
2015
On robustness of speech based biometric systems against voice conversion attack
Monisankha Pal
,
G. Saha
Applied Soft Computing
2015
Corpus ID: 43419915
2011
2011
A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Zhuo Hao
,
Sheng Zhong
,
Nenghai Yu
International Journal of Computers Communications…
2011
Corpus ID: 54202360
Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it…
Expand
2011
2011
Dynamic Terahertz Spoof Surface Plasmon–Polariton Switch Based on Resonance and Absorption
Kyungjun Song
,
P. Mazumder
IEEE Transactions on Electron Devices
2011
Corpus ID: 5243757
In this brief, a terahertz (THz) switch consisting of perfect conductor metamaterials is demonstrated both theoretically and…
Expand
Highly Cited
2010
Highly Cited
2010
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
Hui-Feng Huang
,
Ya-Fen Chang
,
Chun-Hung Liu
Sixth International Conference on Intelligent…
2010
Corpus ID: 12519035
Wireless sensor networks are widely used for applications such as environmental monitoring, airport safety, health care, etc. For…
Expand
Highly Cited
2007
Highly Cited
2007
Improving the security of 'a flexible biometrics remote user authentication scheme'
M. Khan
,
Jiashu Zhang
Comput. Stand. Interfaces
2007
Corpus ID: 33160431
2007
2007
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
Damiano Bolzoni
,
B. Crispo
,
S. Etalle
LiSA
2007
Corpus ID: 8856770
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection…
Expand
Highly Cited
2005
Highly Cited
2005
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme
Eunjun Yoon
,
Eun-Kyung Ryu
,
K. Yoo
Computers & security
2005
Corpus ID: 194579
Highly Cited
2004
Highly Cited
2004
An approach to security and privacy of RFID system for supply chain
Xingxin Gao
,
Zhe Xiang
,
Hao Wang
,
Jun Shen
,
Jian Huang
,
Song Song
IEEE International Conference on E-Commerce…
2004
Corpus ID: 15916460
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items…
Expand
Highly Cited
2003
Highly Cited
2003
A remote user authentication scheme using smart cards with forward secrecy
A.K.Awasthi
,
Sunder Lal
IEEE Trans. Consumer Electron.
2003
Corpus ID: 34328412
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE