Professor Keith Mayes

  1. 2010
  2. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K., 2010, Springer.

    Research output: Book/ReportBook

  5. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C., 2010, In: Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In: Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticlepeer-review

  8. 2009
  9. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In: Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., 1 May 2009, In: Information Security Technical Report. 14, 2, p. 87-95 9 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Smart Cards

    Tunstall, M., Markantonakis, K., Sauveron, D. & Mayes, K., 2009, Handbook of Technology Management. Bidgoli, H. (ed.). John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. 2008
  19. Published

    Mobile communication security controllers an evaluation paper

    Mayes, K. E. & Markantonakis, K., 1 Aug 2008, In: Information Security Technical Report. 13, p. 173-192 20 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In: IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published
  24. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. 2007
  27. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  28. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  29. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution