Skip to search formSkip to main contentSkip to account menu

Spoofing attack

Known as: Email forging, GPS spoofing, Spoof attack 
In the context of network security, a spoofing attack is a situation in which one person or program successfully masquerades as another by falsifying… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Abstract Armed drones pose a major threat to the general prohibition on the inter-state use of force and to respect for human… 
2011
2011
Cloud computing is becoming popular quickly. In cloud computing, people store their important data in the cloud, which makes it… 
2011
2011
In this brief, a terahertz (THz) switch consisting of perfect conductor metamaterials is demonstrated both theoretically and… 
2011
2011
Theft of a template is theft of identity Fingerprint identification is used by forensic department in identifying criminals… 
2011
2011
Recently, Yoon et al. proposed an efficient biometrics-based multi-server authentication with key agreement scheme for smart… 
2010
2010
Probabilistic routing protocols in Delay Tolerant Networks (DTN) make use of the mobility history in its prediction when making a… 
2005
2005
In the near future, radio frequency identiflcation (RFID) technology is expected to play an important role for object… 
Highly Cited
2004
Highly Cited
2004
Radio frequency identification (RFID) is expected to become pervasive and ubiquitous, as it can be embedded into everyday items… 
Highly Cited
2003
Highly Cited
2003
In 2000, Hwang and Li proposed a new remote user authentication scheme using smart cards. Chan and Chang showed that the…