Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Relay attack

A relay attack in computer security is a type of hacking technique related to man-in-the-middle and replay attacks. In a classic man-in-the-middle… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
RFID tags are nowadays used for granting access to buildings, tracking goods, persons and animals, in electronic toll collection… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a verifier (terminal) without any user… Expand
  • figure 1
  • figure 2
  • figure 3
  • table II
  • table III
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The recent emergence of Near Field Communication (NFC) enabled smart phones resulted in an increasing interest in NFC security… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in modern cars. We build two efficient and… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Contactless technology is widely used in security sensitive applications, including identification, payment and access-control… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2011
2011
Contactless technology is a well explored area used in many different fields. However, the lack of security in the physical layer… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2010
Highly Cited
2010
NFC is a standardised technology providing short-range RFID communication channels for mobile devices. Peer-to-peer applications… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Contactless and contact smart card systems use the physical constraints of the communication channel to implicitly prove the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
  • Seonho Choi
  • Seventh IEEE International Symposium on…
  • 2005
  • Corpus ID: 2465872
Requirements that need to be met by multicast authentication schemes are packet authenticity, packet loss robustness, loss model… Expand
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Contactless smart cards are used in access control and pay- ment systems. This paper illustrates an attack which effectively… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?