Professor Keith Mayes

  1. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In: Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  2. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  5. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, (E-pub ahead of print) In: International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On the potential of high density smart cards

    Mayes, K. E. & Markantonakis, K., 2006, In: Information Security Technical Report. 11, 3, p. 147 - 153

    Research output: Contribution to journalArticlepeer-review

  9. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In: International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticlepeer-review

  10. E-pub ahead of print

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  11. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, (E-pub ahead of print) p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 21 Feb 2016, p. 38-44.

    Research output: Contribution to conferencePaperpeer-review

  15. Published

    Performance Evaluation of the TUAK algorithm in support of the GSMA and ETSI SAGE standardisation group

    Mayes, K., 31 Oct 2014, Crisp Telecom.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  16. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., 23 Apr 2017, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  17. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, (E-pub ahead of print) The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  21. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review