Professor Keith Mayes

  1. 2018
  2. Forthcoming

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S. 27 Feb 2018 6 p.

    Research output: Contribution to conferencePaper

  3. 2017
  4. Published

    Analysing the Resilience of the IoT against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R. 9 Dec 2017 The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S. 9 Nov 2017 p. 1-12 12 p.

    Research output: Contribution to conferencePaper

  6. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K. 11 Sep 2017 Trustcom/BigDataSE/ICESS, 2017 IEEE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K. 29 Aug 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K. 23 Aug 2017 SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    Philanthropy On The Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K. 3 Aug 2017 The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, (Lecture Notes in Computer Science (LNCS))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print
  11. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K. 20 Jul 2017 Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Characterising a CPU Fault Attack Model via Run-Time Data Analysis

    Kelly, M., Mayes, K. & Walker, J. F. 19 Jun 2017 6 p.

    Research output: Contribution to conferencePaper

  13. E-pub ahead of print

    Tokenisation Blacklisting using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K. 14 Jun 2017 Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. E-pub ahead of print

    Gesture Recognition Implemented on a Personal Limited Device.

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 11 May 2017 6 p.

    Research output: Contribution to conferencePaper

  16. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K. 23 Apr 2017

    Research output: Contribution to conferencePaper

  17. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K. 27 Mar 2017 Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Preventing Relay Attacks in Mobile Transactions Using Infrared Light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K. 4 Mar 2017 SAC '17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E. 1 Mar 2017 Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K. 9 Feb 2017 The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Log your car: The non-invasive vehicle forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 9 Feb 2017 he 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 1-9 9 p. TrustCom Paper 147

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 2017 Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143, p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K. 2017 In : International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p., 57017

    Research output: Contribution to journalArticle

  24. 2016
  25. Published

    You Can't Touch This: Consumer-Centric Android Application Repackaging Detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K. 1 Dec 2016 In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  26. Published

    An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (IEEE DASC 2016). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260400

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260399

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A. 21 Feb 2016 p. 38-44

    Research output: Contribution to conferencePaper

  29. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A. 2016 In : International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p., Sec16v9n34:contribution 55009

    Research output: Contribution to journalArticle

  30. 2015
  31. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K. 6 Nov 2015 Network and System Security. Springer, Vol. 9408, p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K. 20 Aug 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Authentication Based on a Changeable Biometric using Gesture Recognition with the Kinect

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 22 May 2015 The 8th IAPR International Conference on Biometrics (ICB) 2015. Phuket : IEEE, p. 38 - 45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K. 20 Feb 2015 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K. 2015 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K. 2015 Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924, p. 180-195 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  37. 2014
  38. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. Dec 2014 In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  39. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K. 1 Nov 2014 The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 26 Sep 2014 The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 10 Sep 2014 The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 13 May 2014 The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K. 5 May 2014 Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434, p. 129-143 14 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K. 13 Apr 2014 Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K. Apr 2014 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  46. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Mar 2014 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K. 2014 Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501, p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501)

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  50. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K. 2014 In : International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticle

  51. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K. 2014 Springer. 568 p.

    Research output: Book/ReportBook

  52. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 369-381

    Research output: Chapter in Book/Report/Conference proceedingChapter

  53. 2013
  54. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 9 Dec 2013 The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K. 25 Sep 2013 Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127, p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N. 11 Sep 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 16 Jul 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 8 Jul 2013 The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405, p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K. Mar 2013 In : International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticle

  63. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K. 2013 Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K. 2013 Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873, p. 250-263 14 p. (Lecture Notes In Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  65. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K. 2013 Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. 2012
  67. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K. Nov 2012 The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K. Nov 2012 The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8, p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K. Oct 2012 The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K. Oct 2012 Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Jun 2012 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 May 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S. 2012 In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  74. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K. 2012 Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. 2011
  76. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2011 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Oct 2011 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Jul 2011 the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H. 1 Jun 2011 Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H. 1 Mar 2011 In : International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticle

  81. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K. 1 Jan 2011 Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S. 2011 In : Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  83. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K. 2011 In : Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  84. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (ed.), Markantonakis, K. (ed.), Mayes, K. (ed.) & Verikoukis, C. (ed.) 2011 In : EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issue

  85. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K. 2011 Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90, p. 221-232 (Lecture Notes in Electrical Engineering)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. 2010
  87. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K. 1 Dec 2010 In : International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticle

  88. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Dec 2010 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H. 1 Dec 2010 Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1, p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Sep 2010 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published
  92. Published

    Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G., Markantonakis, K. & Mayes, K. May 2010 In : Journal of Internet Technology. 11, 3, p. 307 313 p.

    Research output: Contribution to journalArticle

  93. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Apr 2010 Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010, p. 118-132 15 p. (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H. 1 Apr 2010 Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Mar 2010 Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K. 1 Mar 2010 In : International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticle

  97. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G. Jan 2010 Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  98. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K. 2010 M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K. 2010 Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370, p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K. 2010 Springer.

    Research output: Book/ReportBook

  101. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C. 2010 In : Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticle

  102. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K. 2010 Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. W. L., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I, p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K. 2010 In : Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticle

  104. 2009
  105. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2009 On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009, p. 128 - 138 (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Aug 2009 The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009, p. 20-35 16 p. (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K. 1 May 2009 In : Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticle

  108. Published

    Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G. 1 May 2009 In : Information Security Technical Report. 14, 2, p. 87-95 9 p.

    Research output: Contribution to journalArticle

  109. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K. 1 Jan 2009 Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K. 2009 In : Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticle

Previous 1 2 Next