Professor Keith Mayes

  1. 2021
  2. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  3. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  5. 2020
  6. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  7. E-pub ahead of print

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 31 Oct 2020, (E-pub ahead of print) p. 968-984. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  8. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  9. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, (E-pub ahead of print) p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  10. 2019
  11. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, (E-pub ahead of print) In: International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticlepeer-review

  12. 2018
  13. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, (E-pub ahead of print) Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, (E-pub ahead of print) The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  16. 2017
  17. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In: International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., 23 Apr 2017, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  26. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Characterising a CPU fault attack model via run-time data analysis

    Kelly, M., Mayes, K. & Walker, J. F., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  32. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  33. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  34. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. 2016
  37. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 31 Dec 2016, In: International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticlepeer-review

  38. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In: Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 21 Feb 2016, p. 38-44.

    Research output: Contribution to conferencePaperpeer-review

  42. Published

    Universal Mobile Telecommunications System (UMTS); LTE; Performance evaluation of the Tuak algorithm set

    Mayes, K., Jan 2016, ETSI TR 135 935: Technical Report.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. 2015
  44. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, (E-pub ahead of print) Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2 Jul 2015, 2015 International Conference on Biometrics (ICB). IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  51. 2014
  52. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Performance Evaluation of the TUAK algorithm in support of the GSMA and ETSI SAGE standardisation group

    Mayes, K., 31 Oct 2014, Crisp Telecom.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  55. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  61. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  65. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K., 2014, In: International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K., 2014, Springer. 568 p.

    Research output: Book/ReportBook

  67. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  68. 2013
  69. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  80. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. 2012
  82. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  89. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. 2011
  91. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In: International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In: Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  98. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In: Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  99. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (Guest ed.), Markantonakis, K. (Guest ed.), Mayes, K. (Guest ed.) & Verikoukis, C. (Guest ed.), 2011, In: EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issuepeer-review

  100. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. 2010
  102. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In: International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticlepeer-review

  103. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published
  107. Published

    Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G., Markantonakis, K. & Mayes, K., May 2010, In: Journal of Internet Technology. 11, 3, p. 307 313 p.

    Research output: Contribution to journalArticlepeer-review

  108. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  112. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Previous 1 2 Next