Skip to search formSkip to main contentSkip to account menu

Relay attack

A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection… 
2015
2015
Recently released smartphones is equipped with support for Near Field Communication. Near Field Communication (NFC) is a short… 
2013
2013
Wireless communication techniques provide convenience for users to get desired information. Construction and management costs of… 
2012
2012
Today Radio Frequency identification RFiD systems are widely used in a variety of security sensitive applications such as access… 
Review
2012
Review
2012
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how… 
2011
2011
Contactless technology is a well explored area used in many different fields. However, the lack of security in the physical layer… 
2010
2010
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without… 
2009
2009
Many secure systems, such as contactless credit cards and secure entrance systems, are built with contactless smartcard RFID… 
2009
2009
The Session Initiation Protocol (SIP [RFC3261]) provides a mechanism for creating, modifying, and terminating sessions with one… 
2008
2008
In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is…