Skip to search formSkip to main contentSkip to account menu

Relay attack

A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Electronic payment (e-payment) has been around for decades and has been used all around the world. This type of payment has been… 
2015
2015
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection… 
2015
2015
RFID search protocols are suggested for the past decade to efficiently find a specific tag among a large number of tags by a… 
2014
2014
Dutch banks introduced contactless payments in April 2014, and have been promoting the use of contactless cards since then… 
2012
2012
Today Radio Frequency identification RFiD systems are widely used in a variety of security sensitive applications such as access… 
2012
2012
NFC(near field communication) technology is a kind of technology to provide close RFID communication channel on mobile devices… 
2011
2011
Contactless technology is a well explored area used in many different fields. However, the lack of security in the physical layer… 
2010
2010
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without… 
2008
2008
In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is… 
2007
2007
CAPTCHAs are designed to be difficult for machines to solve yet easy for humans, allowing web sites to recognize software agents…