default search action
Carlton Shepherd
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2024
- [b2]Carlton Shepherd, Konstantinos Markantonakis:
Trusted Execution Environments. Springer 2024, ISBN 978-3-031-55560-2, pp. 1-196 - 2019
- [b1]Carlton Shepherd:
Techniques for establishing trust in modern constrained sensing platforms with trusted execution environments. Royal Holloway, University of London, Egham, UK, 2019
Journal Articles
- 2024
- [j7]Konstantinos Markantonakis, Julia A. Meister, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram, Sarah Hani Abu Ghazalah, Mumraiz Kasi, Damien Sauveron, Gerhard P. Hancke:
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access 12: 150372-150386 (2024) - [j6]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Xiaoping Wu, Wenlong Ke, Shui Yu:
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 133: 108449 (2024) - [j5]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shui Yu, Tingting Li:
Comparative DQN-Improved Algorithms for Stochastic Games-Based Automated Edge Intelligence-Enabled IoT Malware Spread-Suppression Strategies. IEEE Internet Things J. 11(12): 22550-22561 (2024) - [j4]Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis:
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3141-3152 (2024) - [j3]Yizhou Shen, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen, Shui Yu:
SGD3QN: Joint Stochastic Games and Dueling Double Deep Q-Networks for Defending Malware Propagation in Edge Intelligence-Enabled Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 6978-6990 (2024) - 2023
- [j2]Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. IEEE Trans. Computers 72(7): 2065-2079 (2023) - 2021
- [j1]Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Comput. Secur. 111: 102471 (2021)
Conference and Workshop Papers
- 2024
- [c17]Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd:
ZKP Enabled Identity and Reputation Verification in P2P Marketplaces. Blockchain 2024: 591-598 - 2023
- [c16]Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. TrustCom 2023: 549-558 - 2021
- [c15]Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. SP (Workshops) 2021: 221-227 - 2019
- [c14]Pradip Mainali, Carlton Shepherd:
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation. ARES 2019: 73:1-73:10 - [c13]Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas:
Privacy-Enhancing Context Authentication from Location-Sensitive Data. ARES 2019: 87:1-87:10 - 2018
- [c12]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Remote Credential Management with Mutual Attestation for Trusted Execution Environments. WISTP 2018: 157-173 - 2017
- [c11]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. ARES 2017: 7:1-7:10 - [c10]Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram:
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. CPSS@AsiaCCS 2017: 21-32 - [c9]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Towards trusted execution of multi-modal continuous authentication schemes. SAC 2017: 1444-1451 - [c8]Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram:
Proximity Assurances Based on Natural and Artificial Ambient Environments. SECITC 2017: 83-103 - [c7]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c6]Carlton Shepherd, Fabien A. P. Petitcolas, Raja Naeem Akram, Konstantinos Markantonakis:
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. TrustBus 2017: 164-179 - [c5]Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - [c4]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. WISTP 2017: 75-92 - 2016
- [c3]Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. Trustcom/BigDataSE/ISPA 2016: 168-177 - 2015
- [c2]Reuben Kirkham, Carlton Shepherd, Thomas Plötz:
BlobSnake: gamification of feature extraction for 'plug and play' human activity recognition. BCS HCI 2015: 74-81 - 2013
- [c1]Feng Hao, Dylan Clarke, Carlton Shepherd:
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy. Security Protocols Workshop 2013: 245-254
Informal and Other Publications
- 2024
- [i14]Zhanyu Sha, Carlton Shepherd, Amir Rafi, Konstantinos Markantonakis:
Control-Flow Attestation: Concepts, Solutions, and Open Challenges. CoRR abs/2408.06304 (2024) - 2023
- [i13]Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. CoRR abs/2308.00437 (2023) - 2022
- [i12]Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. CoRR abs/2204.11639 (2022) - 2021
- [i11]Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. CoRR abs/2102.08804 (2021) - [i10]Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd, Benjamin Semal:
A DLT-based Smart Contract Architecture for Atomic and Scalable Trading. CoRR abs/2105.02937 (2021) - [i9]Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache:
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey. CoRR abs/2105.04454 (2021) - [i8]Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis:
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices. CoRR abs/2110.06363 (2021) - [i7]Vihangi Vagal, Konstantinos Markantonakis, Carlton Shepherd:
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles. CoRR abs/2110.09453 (2021) - 2019
- [i6]Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas:
Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication. CoRR abs/1904.08800 (2019) - [i5]Pradip Mainali, Carlton Shepherd:
Providing Confidential Cloud-based Fall Detection from Remote Sensor Data Using Multi-Party Computation. CoRR abs/1904.09896 (2019) - 2018
- [i4]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs. CoRR abs/1804.10707 (2018) - 2017
- [i3]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. CoRR abs/1712.03943 (2017) - 2016
- [i2]Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes:
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments. CoRR abs/1601.07101 (2016) - [i1]Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. CoRR abs/1605.00425 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint