default search action
Keith Mayes
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Martin Higgins, Keith Mayes, Fei Teng:
Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence. IET Cyper-Phys. Syst.: Theory & Appl. 6(1): 12-26 (2021) - [j16]Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [i9]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. CoRR abs/2103.08229 (2021) - 2020
- [c84]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. AsiaCCS 2020: 471-480 - [c83]Martin S. Kelly, Keith Mayes:
High Precision Laser Fault Injection using Low-cost Components. HOST 2020: 219-228 - [c82]Keith Mayes:
Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor. SmartIoT 2020: 1-8 - [c81]Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. TrustCom 2020: 328-336 - [i8]Martin Higgins, Keith Mayes, Fei Teng:
Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence. CoRR abs/2010.14173 (2020)
2010 – 2019
- 2019
- [j15]He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang:
Novel implementation of defence strategy of relay attack based on cloud in RFID systems. Int. J. Inf. Comput. Secur. 11(2): 120-144 (2019) - 2018
- [j14]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". Future Gener. Comput. Syst. 80: 537-545 (2018) - 2017
- [c80]Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. ARES 2017: 5:1-5:10 - [c79]Martin S. Kelly, Keith Mayes, John F. Walker:
Characterising a CPU fault attack model via run-time data analysis. HOST 2017: 79-84 - [c78]Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Comparison of dynamic biometrie security characteristics against other biometrics. ICC 2017: 1-7 - [c77]Iakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Preventing relay attacks in mobile transactions using infrared light. SAC 2017: 1724-1731 - [c76]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c75]He Xu, Daniele Sgandurra, Keith Mayes, Peng Li, Ruchuan Wang:
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks. SpaCCS Workshops 2017: 291-301 - [c74]Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - [c73]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette:
A Secure and Trusted Channel Protocol for UAVs Fleets. WISTP 2017: 3-24 - [c72]Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Philanthropy on the Blockchain. WISTP 2017: 25-38 - [p14]Keith Mayes:
An Introduction to Smart Cards. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 1-29 - [p13]Keith Mayes, Tim Evans:
Smart Cards and Security for Mobile Communications. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 93-128 - [p12]Gary Waite, Keith Mayes, Raja Naeem Akram:
Application Development Environments for Java and SIM Toolkit. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 253-281 - [p11]Chris Torr, Keith Mayes:
MULTOS and MULTOS Application Development. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 469-496 - [p10]Assad Umar, Keith Mayes:
Trusted Execution Environment and Host Card Emulation. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 497-519 - [e3]Keith Mayes, Konstantinos Markantonakis:
Smart Cards, Tokens, Security and Applications, Second Edition. Springer 2017, ISBN 978-3-319-50498-8 [contents] - [i7]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette:
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. CoRR abs/1708.05732 (2017) - 2016
- [j13]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
You can't touch this: Consumer-centric android application repackaging detection. Future Gener. Comput. Syst. 65: 1-9 (2016) - [c71]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. Inscrypt 2016: 484-504 - [c70]Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
A Smart Card Web Server in the Web of Things. IntelliSys (2) 2016: 769-784 - [c69]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Two rounds RFID grouping-proof protocol. IEEE RFID 2016: 161-174 - [c68]Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Enhancing EMV Tokenisation with Dynamic Transaction Tokens. RFIDSec 2016: 107-122 - [c67]Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis:
Tokenisation Blacklisting Using Linkable Group Signatures. SecureComm 2016: 182-198 - [c66]Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. Trustcom/BigDataSE/ISPA 2016: 443-450 - [c65]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. Trustcom/BigDataSE/ISPA 2016: 974-982 - [i6]Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes:
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments. CoRR abs/1601.07101 (2016) - [i5]Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. CoRR abs/1605.00425 (2016) - [i4]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks. CoRR abs/1608.04115 (2016) - [i3]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. CoRR abs/1608.04116 (2016) - 2015
- [c64]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. ARES 2015: 139-148 - [c63]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. ESORICS (2) 2015: 541-560 - [c62]Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Authentication based on a changeable biometric using gesture recognition with the Kinect™. ICB 2015: 38-45 - [c61]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Let's Get Mobile: Secure FOTA for Automotive System. NSS 2015: 503-510 - [c60]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, Keith Mayes:
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. TrustCom/BigDataSE/ISPA (1) 2015: 483-490 - [c59]Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes:
Enhancing EMV Online PIN Verification. TrustCom/BigDataSE/ISPA (1) 2015: 808-817 - 2014
- [j12]Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis:
Remote E-Voting Using the Smart Card Web Server. Int. J. Secur. Softw. Eng. 5(1): 39-60 (2014) - [c58]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. AINA Workshops 2014: 871-878 - [c57]Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes:
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. COSADE 2014: 261-280 - [c56]Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Practical Attacks on Virtual Worlds. CRiSIS 2014: 180-195 - [c55]Xuefei Leng, Keith Mayes, Yuanhung Lien:
Ownership Management in the Context of the Internet of Things. CyberC 2014: 150-153 - [c54]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Improved Cloud-Based RFID Authentication Protocol. DPM/SETOP/QASA 2014: 147-164 - [c53]Danushka Jayasinghe, Konstantinos Markantonakis, Keith Mayes:
Optimistic Fair-Exchange with Anonymity for Bitcoin Users. ICEBE 2014: 44-51 - [c52]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
Precise Instruction-Level Side Channel Profiling of Embedded Processors. ISPEC 2014: 129-143 - [c51]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Trusted Platform Module for Smart Cards. NTMS 2014: 1-5 - [c50]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. TrustCom 2014: 422-431 - [c49]Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes:
CAN Bus Risk Analysis Revisit. WISTP 2014: 170-179 - [p9]Keith Mayes, Konstantinos Markantonakis:
An Introduction to Smart Cards and RFIDs. Secure Smart Embedded Devices, Platforms and Applications 2014: 3-25 - [p8]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to the Trusted Platform Module and Mobile Trusted Module. Secure Smart Embedded Devices, Platforms and Applications 2014: 71-93 - [p7]Keith Mayes, Konstantinos Markantonakis:
Information Security Best Practices. Secure Smart Embedded Devices, Platforms and Applications 2014: 119-144 - [p6]Keith Mayes, Konstantinos Markantonakis:
Mobile Communication Security Controllers. Secure Smart Embedded Devices, Platforms and Applications 2014: 227-266 - [p5]Graham Hili, Keith Mayes, Konstantinos Markantonakis:
The BIOS and Rootkits. Secure Smart Embedded Devices, Platforms and Applications 2014: 369-381 - [p4]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to Java Card Programming. Secure Smart Embedded Devices, Platforms and Applications 2014: 497-513 - [p3]Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications. Secure Smart Embedded Devices, Platforms and Applications 2014 - [p2]Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications. Secure Smart Embedded Devices, Platforms and Applications 2014 - [e2]Konstantinos Markantonakis, Keith Mayes:
Secure Smart Embedded Devices, Platforms and Applications. Springer 2014, ISBN 978-1-4614-7914-7 [contents] - 2013
- [c48]Behrang Fouladi, Konstantinos Markantonakis, Keith Mayes:
Vulnerability Analysis of a Commercial .NET Smart Card. CARDIS 2013: 125-139 - [c47]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Recovering from a Lost Digital Wallet. HPCC/EUC 2013: 1615-1621 - [c46]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram:
Subscriber Centric Conditional Access System for Pay-TV Systems. ICEBE 2013: 450-455 - [c45]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. ICICS 2013: 151-166 - [c44]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. ICITST 2013: 44-51 - [c43]Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Using the Smart Card Web Server in Secure Branchless Banking. NSS 2013: 250-263 - [c42]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions. RFIDSec Asia 2013: 107-121 - [c41]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. SEC 2013: 102-110 - [c40]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. SecureComm 2013: 288-304 - [c39]Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Virtual World Authentication Using the Smart Card Web Server. SSCC 2013: 30-41 - [c38]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. TrustCom/ISPA/IUCC 2013: 336-345 - [c37]Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis:
Card-Present Transactions on the Internet Using the Smart Card Web Server. TrustCom/ISPA/IUCC 2013: 611-619 - [e1]Jason Crampton, Sushil Jajodia, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9 [contents] - 2012
- [c36]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. CIS 2012: 646-652 - [c35]Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Distributed e-voting using the Smart Card Web Server. CRiSIS 2012: 1-8 - [c34]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. ICICS 2012: 214-227 - [c33]Xuefei Leng, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Tag Group Authentication Using Bit-Collisions. ISSA 2012: 1-8 - [c32]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. NTMS 2012: 1-7 - [c31]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. RFIDSec Asia 2012: 21-32 - [c30]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. TrustCom 2012: 383-392 - 2011
- [j11]Yuanhung Lien, Xuefei Leng, Keith Mayes, Jung-Hui Chiu:
Select-response grouping proof and its verification protocol for RFID tags. Int. J. Intell. Inf. Database Syst. 5(2): 101-118 (2011) - [j10]Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Considerations for mobile authentication in the Cloud. Inf. Secur. Tech. Rep. 16(3-4): 123-130 (2011) - [c29]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application-Binding Protocol in the User Centric Smart Card Ownership Model. ACISP 2011: 208-225 - [c28]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
User Centric Security Model for Tamper-Resistant Devices. ICEBE 2011: 168-177 - [c27]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. TrustCom 2011: 597-605 - [i2]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptol. ePrint Arch. 2011: 618 (2011) - 2010
- [j9]Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis:
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. Int. J. Secur. Networks 5(2/3): 79-86 (2010) - [j8]Keith Mayes, Carlos Cid:
The MIFARE Classic story. Inf. Secur. Tech. Rep. 15(1): 8-12 (2010) - [c26]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions. AICT 2010: 452-461 - [c25]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Firewall Mechanism in a User Centric Smart Card Ownership Model. CARDIS 2010: 118-132 - [c24]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Simulator Problem in User Centric Smart Card Ownership Model. EUC 2010: 679-686 - [c23]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Paradigm Shift in Smart Card Ownership Model. ICCSA Workshops 2010: 191-200 - [c22]Lishoy Francis, Keith Mayes, Gerhard P. Hancke, Konstantinos Markantonakis:
A location based security framework for authenticating mobile phones. M-MPAC@Middleware 2010: 5 - [c21]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. RFIDSec 2010: 35-49 - [c20]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. SEC 2010: 161-172 - [c19]Jonathan Hart, Konstantinos Markantonakis, Keith Mayes:
Website Credential Storage and Two-Factor Web Authentication with a Java SIM. WISTP 2010: 229-236 - [i1]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones. IACR Cryptol. ePrint Arch. 2010: 228 (2010)
2000 – 2009
- 2009
- [j7]Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Confidence in smart token proximity: Relay attacks revisited. Comput. Secur. 28(7): 615-627 (2009) - [j6]Konstantinos Markantonakis, Michael Tunstall, Gerhard P. Hancke, Ioannis G. Askoxylakis, Keith Mayes:
Attacking smart card systems: Theory and practice. Inf. Secur. Tech. Rep. 14(2): 46-56 (2009) - [j5]Keith Mayes, Konstantinos Markantonakis, Gerhard P. Hancke:
Transport ticketing security and fraud controls. Inf. Secur. Tech. Rep. 14(2): 87-95 (2009) - [c18]George Poulopoulos, Konstantinos Markantonakis, Keith Mayes:
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. ARES 2009: 706-711 - [c17]Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu:
Select-Response Grouping Proof for RFID Tags. ACIIDS 2009: 73-77 - [c16]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. ICITST 2009: 1-8 - [c15]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Location Based Application Availability. OTM Workshops 2009: 128-138 - [c14]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application Management Framework in User Centric Smart Card Ownership Model. WISA 2009: 20-35 - 2008
- [j4]Keith Mayes, Konstantinos Markantonakis:
Mobile communication security controllers an evaluation paper. Inf. Secur. Tech. Rep. 13(3): 173-192 (2008) - [c13]Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis:
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. CARDIS 2008: 118-132 - [c12]Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Ioannis G. Askoxylakis:
Overview of Security Threats for Smart Cards in the Public Transport Industry. ICEBE 2008: 506-513 - [c11]Yuanhung Lien, Xuefei Leng, Keith Mayes, Jung-Hui Chiu:
Reading order independent grouping proof for RFID tags. ISI 2008: 128-136 - 2007
- [c10]Constantinos Markantonakis, Keith Mayes:
Problems and Prospects of Multi Application Smart cards in the UK Financial Industry. ICEBE 2007: 447-452 - [c9]Kevin Eagles, Constantinos Markantonakis, Keith Mayes:
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. WISTP 2007: 161-174 - [p1]Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233 - 2006
- [j3]Keith Mayes, Konstantinos Markantonakis:
On the potential of high density smart cards. Inf. Secur. Tech. Rep. 11(3): 147-153 (2006) - [c8]Qing Zhang, Konstantinos Markantonakis, Keith Mayes:
Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery. AICCSA 2006: 851-858 - [c7]William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Design, Installation and Execution of a Security Agent for Mobile Stations. CARDIS 2006: 1-15 - [c6]Michael Tunstall, Constantinos Markantonakis, Keith Mayes:
Inhibiting Card Sharing Attacks. IWSEC 2006: 239-251 - [c5]William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Secure Deployment of Applications to Fielded Devices and Smart Cards. WOSIS 2006: 195-206 - [c4]Qing Zhang, Constantinos Markantonakis, Keith Mayes:
A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol. CEC/EEE 2006: 20 - 2005
- [c3]Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis:
Countermeasures for Attacks on Satellite TV Cards using Open Receivers. ACSW 2005: 153-158 - [c2]K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang, William G. Sirett, Keith Mayes:
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. SEC 2005: 551-564 - 2004
- [c1]Konstantinos Markantonakis, Keith Mayes:
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography. Communications and Multimedia Security 2004: 79-95 - 2003
- [j2]Keith Mayes, Konstantinos Markantonakis:
Are we smart about security? Inf. Secur. Tech. Rep. 8(1): 6-16 (2003) - [j1]Konstantinos Markantonakis, Keith Mayes:
An overview of the GlobalPlatform smart card specification. Inf. Secur. Tech. Rep. 8(1): 17-29 (2003)
Coauthor Index
aka: Constantinos Markantonakis
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint