Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,541,939 papers from all fields of science
Search
Sign In
Create Free Account
Replay attack
Known as:
Playback attack
, Freshness
, Freshness (cryptography)
Expand
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
Adversary (cryptography)
Anti-replay
Application security
Aurora Generator Test
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Poly(lactic acid) film incorporated with marigold flower extract (Tagetes erecta) intended for fatty-food application
H. Samsudin
,
H. Soto-Valdez
,
R. Auras
2014
Corpus ID: 56386746
Highly Cited
2014
Highly Cited
2014
A Fresh Look on Knowledge Bases: Distilling Named Events from News
Erdal Kuzey
,
Jilles Vreeken
,
G. Weikum
International Conference on Information and…
2014
Corpus ID: 7389944
Knowledge bases capture millions of entities such as people, companies or movies. However, their knowledge of named events like…
Expand
Review
2013
Review
2013
Introduction to the special section on twitter and microblogging services
Irwin King
,
W. Nejdl
TIST
2013
Corpus ID: 17471180
Welcome to this special section on Twitter and Microblogging Services, which features five articles on different aspects of…
Expand
Review
2013
Review
2013
SAMOA: a platform for mining big data streams
G. D. F. Morales
The Web Conference
2013
Corpus ID: 22087513
Social media and user generated content are causing an ever growing data deluge. The rate at which we produce data is growing…
Expand
Highly Cited
2013
Highly Cited
2013
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
R. Arshad
,
N. Ikram
Multimedia tools and applications
2013
Corpus ID: 17959524
The Session Initiation Protocol (SIP) is the most widely used signaling protocol for controlling communication on the internet…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
2005
2005
Replay attack in TCG specification and solution
D. Bruschi
,
L. Cavallaro
,
A. Lanzi
,
Mattia Monga
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 15624697
We prove the existence of a flaw which we individuated in the design of the object-independent authorization protocol (OIAP…
Expand
Highly Cited
2003
Highly Cited
2003
Quality Index Method (QIM) scheme developed for farmed Atlantic salmon (Salmo salar)
K. Sveinsdóttir
,
Grethe Hyldig
,
E. Martinsdóttir
,
B. Jørgensen
,
K. Kristbergsson
2003
Corpus ID: 56326092
Highly Cited
2002
Highly Cited
2002
A simple remote user authentication scheme
M. Hwang
,
Cheng-Chi Lee
,
Yuan-Liang Tang
2002
Corpus ID: 60863308
Highly Cited
1980
Highly Cited
1980
New Critical Essays
R. Barthes
1980
Corpus ID: 191006802
New Criticalgathers Roland Barthes's essays on classic texts of French literature, works by La Rochefoucauld, Chateaubriand…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE