Professor Konstantinos Markantonakis

  1. 2018
  2. Forthcoming

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K. 6 May 2018

    Research output: Contribution to conferencePaper

  3. Forthcoming

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N. 6 May 2018 9 p.

    Research output: Contribution to conferencePaper

  4. Forthcoming

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K. 5 May 2018

    Research output: Contribution to conferencePaper

  5. 2017
  6. Published

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S. 9 Nov 2017 p. 1-12 12 p.

    Research output: Contribution to conferencePaper

  7. Published

    Serverless Protocols for Inventory and Tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S. 9 Nov 2017 Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R. 29 Oct 2017 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, (Security and Cryptology; vol. 10543)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K. 28 Sep 2017 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N. 12 Sep 2017

    Research output: Contribution to conferencePaper

  11. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K. 11 Sep 2017 Trustcom/BigDataSE/ICESS, 2017 IEEE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K. 29 Aug 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K. 29 Aug 2017 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R. 29 Aug 2017 FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K. 23 Aug 2017 SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Philanthropy On The Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K. 3 Aug 2017 The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, (Lecture Notes in Computer Science (LNCS))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print
  18. Published

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. & Markantonakis, K. 27 Jul 2017 Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 15 p. (Lecture Notes in Computer Science; vol. 10442)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K. 20 Jul 2017 Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Tokenisation Blacklisting using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K. 14 Jun 2017 Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K. & Akram, R. N. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 59-92 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. E-pub ahead of print

    Gesture Recognition Implemented on a Personal Limited Device.

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 11 May 2017 6 p.

    Research output: Contribution to conferencePaper

  24. Published

    Towards Trusted Execution of Multi-modal Continuous Authentication Schemes

    Shepherd, C., Akram, R. & Markantonakis, K. 3 Apr 2017 Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R. 2 Apr 2017 Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K. 27 Mar 2017 Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Preventing Relay Attacks in Mobile Transactions Using Infrared Light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K. 4 Mar 2017 SAC '17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E. 1 Mar 2017 Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K. 9 Feb 2017 The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Log your car: The non-invasive vehicle forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 9 Feb 2017 he 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 1-9 9 p. TrustCom Paper 147

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Secure and Trusted Execution: Past, Present and Future -- A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E. 9 Feb 2017 The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 1-10 10 p. TrustCom Paper 342

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D. 9 Feb 2017 the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, TrustCom Paper 297

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R. 9 Jan 2017 e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 2017 Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143, p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. 2016
  36. Published

    You Can't Touch This: Consumer-Centric Android Application Repackaging Detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K. 1 Dec 2016 In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  37. Published

    An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (IEEE DASC 2016). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260400

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260399

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Challenges of Security and Trust of Mobile Devices as Digital Avionics Component

    Akram, R. & Markantonakis, K. 9 Jun 2016 Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R. 30 May 2016 CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 11 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Two Rounds RFID Grouping-Proof Protocol

    Abu Ghazalah, S. & Markantonakis, K. 3 May 2016 p. 193-203 11 p.

    Research output: Contribution to conferencePaper

  42. Published

    A Secure and Trusted Boot Process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R. 19 Apr 2016 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K. 18 Mar 2016 The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. 2015
  45. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D. 10 Nov 2015 In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  46. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K. 6 Nov 2015 Network and System Security. Springer, Vol. 9408, p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. & Markantonakis, K. 21 Sep 2015 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R. 13 Sep 2015 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. In preparation

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K. 20 Aug 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K. 20 Aug 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. In preparation

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D. 20 Aug 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. In preparation

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M. 11 Jun 2015 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Authentication Based on a Changeable Biometric using Gesture Recognition with the Kinect

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 22 May 2015 The 8th IAPR International Conference on Biometrics (ICB) 2015. Phuket : IEEE, p. 38 - 45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  54. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K. 20 Feb 2015 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K. 2015 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K. 2015 Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924, p. 180-195 16 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  57. 2014
  58. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. Dec 2014 In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  59. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K. 1 Nov 2014 The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 26 Sep 2014 The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 10 Sep 2014 The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K. & Sauveron, D. 1 Sep 2014 The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Liu, Y. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K. 1 Jun 2014 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 13 May 2014 The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K. 5 May 2014 Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434, p. 129-143 14 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K. 13 Apr 2014 Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K. Apr 2014 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  68. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Mar 2014 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  71. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K. 2014 Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501, p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501)

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  72. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K. 2014 In : International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticle

  73. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K. 2014 Springer. 568 p.

    Research output: Book/ReportBook

  74. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K. 2014 Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 369-381

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. 2013
  76. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 9 Dec 2013 The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K. 1 Dec 2013 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2013 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K. 25 Sep 2013 Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127, p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N. 11 Sep 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 16 Jul 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K. 8 Jul 2013 The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405, p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K. 2013 Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K. 2013 Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873, p. 250-263 14 p. (Lecture Notes In Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  87. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K. 2013 Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. 2012
  89. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K. Nov 2012 The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K. Nov 2012 The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8, p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K. Oct 2012 The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K. Oct 2012 Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Jun 2012 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 May 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S. 2012 In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  96. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K. 2012 Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. 2011
  98. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Nov 2011 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Oct 2011 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Jul 2011 the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K. 1 Jan 2011 Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S. 2011 In : Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  103. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K. 2011 In : Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  104. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (ed.), Markantonakis, K. (ed.), Mayes, K. (ed.) & Verikoukis, C. (ed.) 2011 In : EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issue

  105. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K. 2011 Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90, p. 221-232 (Lecture Notes in Electrical Engineering)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  106. 2010
  107. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K. 1 Dec 2010 In : International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticle

  108. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Dec 2010 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K. 1 Sep 2010 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 Next