Professor Keith Mayes

  1. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, (E-pub ahead of print) Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In: IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticlepeer-review

  14. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  15. Published

    Implementation of Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., Nov 2006.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    Increasing Awareness of Smart card System Security Issues: Smart Card Technology International Journal

    Mayes, K., Al Hussein, M. & Markantonakis, K., 2004, Smart Card Technology International Journal. Locke, M. (ed.). Smart Card Technology International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published
  23. Published

    Mobile communication security controllers an evaluation paper

    Mayes, K. E. & Markantonakis, K., 1 Aug 2008, In: Information Security Technical Report. 13, p. 173-192 20 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 31 Dec 2016, In: International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In: International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticlepeer-review