Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,580,320 papers from all fields of science
Search
Sign In
Create Free Account
Relay attack
A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Computer security
Man-in-the-middle attack
Near field communication
Replay attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Analysing the security of NFC based payment systems
N. Tabet
,
M. A. Ayu
International Conference on Intelligent Computing
2016
Corpus ID: 17135420
Electronic payment (e-payment) has been around for decades and has been used all around the world. This type of payment has been…
Expand
2015
2015
EM410x RFID cloned card detection system
Michal Krumnikl
,
P. Moravec
,
Petr Olivka
,
D. Seidl
International Conference on Pervasive and…
2015
Corpus ID: 14912369
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection…
Expand
2015
2015
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach
Hoda Jannati
,
A. Falahati
Wireless personal communications
2015
Corpus ID: 21602710
RFID search protocols are suggested for the past decade to efficiently find a specific tag among a large number of tags by a…
Expand
2014
2014
A security evaluation and proof-of-concept relay attack on Dutch EMV contactless transactions
Jm Jordi Breekel
,
Van Den
2014
Corpus ID: 167356722
Dutch banks introduced contactless payments in April 2014, and have been promoting the use of contactless cards since then…
Expand
2012
2012
Analysis of Relay Attacks on RFiD Systems
J. Lima
,
Ali Miri
,
M. Nevins
IEEE Latin America Transactions
2012
Corpus ID: 34832942
Today Radio Frequency identification RFiD systems are widely used in a variety of security sensitive applications such as access…
Expand
2012
2012
Implementation and Analysis of a Practical NFC Relay Attack Example
Zhao Wang
,
Zhigang Xu
,
Wei Xin
,
Zhong Chen
Second International Conference on…
2012
Corpus ID: 35058190
NFC(near field communication) technology is a kind of technology to provide close RFID communication channel on mobile devices…
Expand
2011
2011
On the weakness of contactless systems under relay attacks
Pierre-Henri Thevenon
,
O. Savry
,
S. Tedjini
SoftCOM , 19th International Conference on…
2011
Corpus ID: 17025517
Contactless technology is a well explored area used in many different fields. However, the lack of security in the physical layer…
Expand
2010
2010
Mutual Attestation Using TPM for Trusted RFID Protocol
M. Mubarak
,
J. Manan
,
S. Yahya
Second International Conference on Network…
2010
Corpus ID: 15548529
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without…
Expand
2008
2008
Secure Directional Routing to Prevent Relay Attack
M. S. Zefreh
,
P. Khadivi
3rd International Conference on Information and…
2008
Corpus ID: 9077705
In a wireless ad hoc network, routing process is done by means of some intermediate nodes. Hence, the behavior of these nodes is…
Expand
2007
2007
Dependent CAPTCHAs : Preventing the Relay Attack
Ran Halprin
2007
Corpus ID: 14002852
CAPTCHAs are designed to be difficult for machines to solve yet easy for humans, allowing web sites to recognize software agents…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE