Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Spoofing attack
Known as:
Email forging
, GPS spoofing
, Spoof attack
Expand
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ARP spoofing
Adversary (cryptography)
Anti-spam techniques
Authentication
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
On robustness of speech based biometric systems against voice conversion attack
Monisankha Pal
,
G. Saha
Applied Soft Computing
2015
Corpus ID: 43419915
2012
2012
Pandora's box? Drone strikes under jus ad bellum, jus in bello, and international human rights law
Stuart Casey-Maslen
Revue Internationale de la Croix-Rouge
2012
Corpus ID: 145079829
Abstract Armed drones pose a major threat to the general prohibition on the inter-state use of force and to respect for human…
Expand
2011
2011
A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
Zhuo Hao
,
Sheng Zhong
,
Nenghai Yu
International Journal of Computers Communications…
2011
Corpus ID: 54202360
Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it…
Expand
2011
2011
Dynamic Terahertz Spoof Surface Plasmon–Polariton Switch Based on Resonance and Absorption
Kyungjun Song
,
P. Mazumder
IEEE Transactions on Electron Devices
2011
Corpus ID: 5243757
In this brief, a terahertz (THz) switch consisting of perfect conductor metamaterials is demonstrated both theoretically and…
Expand
2011
2011
Biometric template security using fuzzy vault
Evelyn Brindha
,
K. Deepikapriya
,
R. Dhivya
International Symposium on Consumer Electronics
2011
Corpus ID: 8719808
Theft of a template is theft of identity Fingerprint identification is used by forensic department in identifying criminals…
Expand
2011
2011
Security flaws in a biometrics-based multi-server authentication with key agreement scheme
De-biao He
IACR Cryptology ePrint Archive
2011
Corpus ID: 13018109
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart…
Expand
2010
2010
A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks
F. Lee
,
Weihan Goh
,
C. Yeo
Sixth Advanced International Conference on…
2010
Corpus ID: 2651829
Probabilistic routing protocols in Delay Tolerant Networks (DTN) make use of the mobility history in its prediction when making a…
Expand
2005
2005
Security and Privacy on Authentication Protocol for Low-cost RFID
Jeongkyu Yang
,
K. Ren
,
Kwangjo Kim
2005
Corpus ID: 18076802
In the near future, radio frequency identiflcation (RFID) technology is expected to play an important role for object…
Expand
Highly Cited
2004
Highly Cited
2004
An approach to security and privacy of RFID system for supply chain
Xingxin Gao
,
Zhe Xiang
,
Hao Wang
,
Jun Shen
,
Jian Huang
,
Song Song
IEEE International Conference on E-Commerce…
2004
Corpus ID: 15916460
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items…
Expand
Highly Cited
2003
Highly Cited
2003
A remote user authentication scheme using smart cards with forward secrecy
A.K.Awasthi
,
Sunder Lal
IEEE Trans. Consumer Electron.
2003
Corpus ID: 34328412
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE