Relay attack

A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
0102020052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
This paper studies a new active eavesdropping technique via the so-called spoofing relay attack, which could be launched by the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
In this paper, we present a practical relay attack that can be mounted on RFID systems found in many applications nowadays. The… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2014
2014
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user… (More)
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table III
Is this relevant?
2013
2013
The recent emergence of Near Field Communication (NFC) enabled smart phones resulted in an increasing interest in NFC security… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in modern cars. We build two efficient and… (More)
Is this relevant?
2008
2008
In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2007
2007
CAPTCHAs are designed to be difficult for machines to solve yet easy for humans, allowing web sites to recognize software agents… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Contactless smart cards are used in access control and payment systems. This paper illustrates an attack which effectively allows… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?