Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,533,077 papers from all fields of science
Search
Sign In
Create Free Account
Relay attack
A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer security
Man-in-the-middle attack
Near field communication
Replay attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
EM410x RFID cloned card detection system
Michal Krumnikl
,
P. Moravec
,
Petr Olivka
,
D. Seidl
International Conference on Pervasive and…
2015
Corpus ID: 14912369
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection…
Expand
2015
2015
Countermeasure of NFC relay attack with jamming
Sungtaek Oh
,
Taekyun Doo
,
Tae-Hyoung Ko
,
Jin Kwak
,
M. Hong
12th International Conference & Expo on Emerging…
2015
Corpus ID: 45374822
Recently released smartphones is equipped with support for Near Field Communication. Near Field Communication (NFC) is a short…
Expand
2013
2013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices
Ya-Fen Chang
,
W. Tai
,
Chia-Chen Chen
Informatica
2013
Corpus ID: 17641953
Wireless communication techniques provide convenience for users to get desired information. Construction and management costs of…
Expand
2012
2012
Analysis of Relay Attacks on RFiD Systems
J. Lima
,
Ali Miri
,
M. Nevins
IEEE Latin America Transactions
2012
Corpus ID: 34832942
Today Radio Frequency identification RFiD systems are widely used in a variety of security sensitive applications such as access…
Expand
Review
2012
Review
2012
Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
Michael Roland
arXiv.org
2012
Corpus ID: 7342919
This report explains recent developments in relay attacks on contactless smartcards and secure elements. It further reveals how…
Expand
2011
2011
On the weakness of contactless systems under relay attacks
Pierre-Henri Thevenon
,
O. Savry
,
S. Tedjini
SoftCOM , 19th International Conference on…
2011
Corpus ID: 17025517
Contactless technology is a well explored area used in many different fields. However, the lack of security in the physical layer…
Expand
2010
2010
Mutual Attestation Using TPM for Trusted RFID Protocol
M. Mubarak
,
J. Manan
,
S. Yahya
Second International Conference on Network…
2010
Corpus ID: 15548529
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without…
Expand
2009
2009
Relay Attacks on RFID-Based Electronic Voting Systems
Yossef Oren
,
A. Wool
2009
Corpus ID: 59724207
Many secure systems, such as contactless credit cards and secure entrance systems, are built with contactless smartcard RFID…
Expand
2009
2009
SIP digest authentication relay attack
Víctor Pascual
,
Humberto J. Abdelnur
2009
Corpus ID: 64229880
The Session Initiation Protocol (SIP [RFC3261]) provides a mechanism for creating, modifying, and terminating sessions with one…
Expand
2008
2008
Secure Directional Routing to Prevent Relay Attack
M. S. Zefreh
,
P. Khadivi
3rd International Conference on Information and…
2008
Corpus ID: 9077705
In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required