Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,607,384 papers from all fields of science
Search
Sign In
Create Free Account
Replay attack
Known as:
Playback attack
, Freshness
, Freshness (cryptography)
Expand
A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
Adversary (cryptography)
Anti-replay
Application security
Aurora Generator Test
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
Salmin Sultana
,
Gabriel Ghinita
,
E. Bertino
,
Mohamed Shehab
IEEE 18th International Conference on Parallel…
2012
Corpus ID: 9476403
Large-scale sensor networks are being deployed in numerous application domains, and often the data they collect are used in…
Expand
Highly Cited
2010
Highly Cited
2010
Private key agreement and secure communication for heterogeneous sensor networks
S. Rahman
,
K. El-Khatib
J. Parallel Distributed Comput.
2010
Corpus ID: 35774587
Highly Cited
2008
Highly Cited
2008
Large-scale simulation of V2V environments
Hugo Conceição
,
Luís Damas
,
Michel Ferreira
,
J. Barros
ACM Symposium on Applied Computing
2008
Corpus ID: 15814278
Providing vehicles with enhanced ability to communicate and exchange real-time data with neighboring vehicles opens up a variety…
Expand
2008
2008
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 8998539
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret…
Expand
2007
2007
An energy efficient link-layer security protocol for wireless sensor networks
L.E. Lighfoot
,
Jian Ren
,
Tongtong Li
IEEE International Conference on Electro…
2007
Corpus ID: 10553293
In recent years, wireless sensor networks (WSNs) have found use in a variety of different applications including environmental…
Expand
2006
2006
QoS-Aware Middleware for Web Services Composition - A Qualitative Approach
H. Issa
,
C. Assi
,
M. Debbabi
International Symposium on Computers and…
2006
Corpus ID: 10435641
One of the benefits of web services is their ability to participate in a web services composition process. Therefore, an end-to…
Expand
2005
2005
Replay attack in TCG specification and solution
D. Bruschi
,
L. Cavallaro
,
A. Lanzi
,
Mattia Monga
Asia-Pacific Computer Systems Architecture…
2005
Corpus ID: 15624697
We prove the existence of a flaw which we individuated in the design of the object-independent authorization protocol (OIAP…
Expand
2005
2005
Efficient nonce-based remote user authentication scheme using smart cards
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Applied Mathematics and Computation
2005
Corpus ID: 36626425
1988
1988
Debugging concurrent processes: a case study
J. Stone
ACM-SIGPLAN Symposium on Programming Language…
1988
Corpus ID: 17899216
We present a case study that illustrates a method of debugging concurrent processes in a parallel programming environment. It…
Expand
Highly Cited
1980
Highly Cited
1980
New Critical Essays
R. Barthes
1980
Corpus ID: 191006802
New Criticalgathers Roland Barthes's essays on classic texts of French literature, works by La Rochefoucauld, Chateaubriand…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE