Dr Raja Naeem Akram

  1. Doctoral Thesis › Research
  2. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  3. Article › Research › Not peer-reviewed
  4. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In : Computer Weekly.

    Research output: Contribution to journalArticle

  5. Article › Research › Peer-reviewed
  6. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  7. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  8. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In : digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticle

  9. Editorial › Research › Not peer-reviewed
  10. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In : Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  11. Chapter › Research
  12. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 59-92 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p. (Lecture Notes in Computer Science ; vol. 9100)(Security and Cryptology - sub series ).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Conference contribution › Research
  19. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 Next