[2021]
[214] Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Raja Naeem Akram, Benjamin Semal, “P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time “, Energies, MDPI, 14, 3, p. 1-25 , 606, 25 Jan 2021.[2020]
[213] Keith Mayes, M. Higgins, F. Teng, “Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence”, IET Cyber-Physical Systems: Theory and Applications, 23 Dec 2020. [212] George-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache, “Return-Oriented Programming on RISC-V.”, ASIA CCS 2020, ACM, Taipei, Taiwan, China, 5 Oct 2020. [211] Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner, “One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud”, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), Guangzhou, China, 30 Sep 2020. [210] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner, “A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service”, the 2nd Workshop on Cloud Security and Privacy, Rome, Italy, 15 Aug 2020. [209] Keith Mayes, “Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor”, IEEE SmartIoT 2020, Beijing, China, 6 Jun 2020. [208] Keith Mayes, “Secure Shared Processing on a Cluster of Trust-Anchors”, in Future Technologies Conference 2020, Vancouver, Canada, 15 May 2020. [207] George-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache, “Return-Oriented Programming on RISC-V”, in ACM ASIACCS 2020, Taipei, Taiwan, Province of China, 16 Feb 2020. [206] Martin Kelly, Keith Mayes, “High Precision Laser Fault Injection using Low-cost Components”, in IEEE International Symposium on Hardware Oriented Security and Trust, San Jose, United States, 13 Feb 2020. [205] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner, “Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems”, the 35th International Conference on ICT Systems Security and Privacy Protection, Maribor, Slovenia, 11 Feb 2020. [204] Qiao HU, Bianxia DU, Konstantinos Markantonakis, Gerhard Hancke, “A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement”, in IEEE Transactions on Industrial Informatics, 19.06.2019, p. 1-11, 19 Jun 2019.[2019]
[203] Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Christopher Watkins, “Location Tracking Using Smartphone Accelerometer and Magnetometer Traces”, the First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), 11 Jun 2019. [202] James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis, “An Evaluation of the Security of the Bitcoin Peer-To-Peer Network”, in IEEE Conference on Blockchain , Halifax, Canada, 3 Aug 2019. [201] Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis, “E-Voting With Blockchain : An E-Voting Protocol with Decentralisation and Voter Privacy”, the 2018 IEEE Conference on Blockchain, Halifax, Canada, 3 Aug 2019. [200] Thibaut Heckmann, James McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache, “Removing epoxy underfill between neighbouring components using acid for component chip-off”, in digital investigation, Vol. 29, 06.2019, p. 198-209, Jun 2019. [199] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis, “Remote Credential Management with Mutual Attestation for Trusted Execution Environments”, the 12th IFIP International Conference on Information Security Theory and Practice (WISTP ’18). Springer, 2019. p. 157-173 (Lecture Notes in Computer Science; Vol. 11469), 12 May 2019. [198] Robert Lee, Konstantinos Markantonakis, Raja Naeem Akram, “Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices”, in ACM Transactions on Embedded Computing Systems, Vol. 18, No. 3, 26, 07.05.2019, p. 1-21, 7 May 2019. [197] He Xu, Weiwei Shen, Peng Li, Keith Mayes, Ruchuan Wang, Dashen Li, Shengxiang Yang, “Novel implementation of defence strategy of relay attack based on cloud in RFID systems”, in International Journal of Information and Computer Security, Vol. 11, No. 2, 30.01.2019, p. 120-144, 30 Jan 2019.[2018]
[196] Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis, “Deep Learning Application in Security and Privacy – Theory and Practice : A Position Paper”, the 12th WISTP International Conference on Information Security Theory and Practice (WISTP’2018). ed. / Olivier Blazy; Chan Yeob Yeun. Brussels, Belgium : Springer-Verlag, 2018. (Lecture Notes in Computer Science), 7 Nov 2018. [195] Thibaut Heckmann, Konstantinos Markantonakis, David Naccache, Thomas Souvignet, “Forensic smartphone analysis using adhesives : Transplantation of Package on Package components”, in: digital investigation, Vol. 26, 09.2018, p. 29-39, Sep 2018. [194] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette, “A Secure and Trusted Channel Protocol for UAVs Fleets”, Information Security Theory and Practice – 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, 2018. p. 3-24 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 10741 LNCS), 21 Jun 2018. [193] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis, “EmLog : Tamper-Resistant System Logging for Constrained Devices with TEEs”, the 11th IFIP International Conference on Information Security Theory and Practice (WISTP’17). Springer, 2018. p. 75-92 (Lecture Notes in Computer Science; Vol. 10741), 21 Jun 2018 [192] Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, “Philanthropy on the Blockchain”, the 11th WISTP International Conference on Information Security Theory and Practice (WISTP’2017), Springer, 2018. p. 25-38 (Lecture Notes in Computer Science (LNCS); Vol. 10741), 21 Jun 2018 [191] Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, “May The Force Be With You: Force-Based Relay Attack Detection”, the 17th Smart Card Research and Advanced Application Conference, Lugano, Switzerland, 26 Jan 2018. [190] James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis, “Consumer Centric Data Control, Tracking and Transparency – A Position Paper”, the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, United States, 6 Sep 2018. [189] Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis, “Fair and Transparent Blockchain based Tendering Framework – A Step Towards Open Governance”, the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, United States, 6 Sep 2018. [188] Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank and Raja Naeem Akram, “Good Vibrations : Artificial Ambience-Based Relay Attack Detection”, the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, 2018, pp. 481-489. [187] Robert Lee, Konstantinos Markantonakis, Raja Naeem Akram, “Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices”, published in: ACM Transactions on Embedded Computing Systems, 4 Sep 2018. [186] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, “A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks“, the 37th DASC Digital Avionics Systems Conference, London, United Kingdom, 15 Aug 2018. [185] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette, “A secure and trusted channel protocol for UAVs fleets”, Information Security Theory and Practice – 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings, 21 Jun 2018. Springer-Verlag, Vol. 10741 LNCS, p. 3-24 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS). [184] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis, “EmLog : Tamper-Resistant System Logging for Constrained Devices with TEEs“, the 11th IFIP International Conference on Information Security Theory and Practice (WISTP’17), 21 Jun 2018. Springer, p. 75-92. [183] Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, “Philanthropy On The Blockchain“, the 11th WISTP International Conference on Information Security Theory and Practice (WISTP’2017), 21 Jun 2018. Springer, p. 25-38. [182] Thibaut Heckmann, Konstantinos Markantonakis, David Naccache, Thomas Souvignet, “Forensic smartphone analysis using adhesives : Transplantation of Package on Package components”, Published in Digital Investigation, 31 May 2018. [181] James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis, “An Evaluation of the Security of the Bitcoin Peer-to- Peer Network”, the 2018 IEEE Conference on Blockchain, Halifax, Canada, 22 May 2018. [180] Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis, “E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy“, the 2018 IEEE Conference on Blockchain , Halifax, Canada, 22 May 2018.[2017]
[179] Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Emmanouil Panaousis, “The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions“, Mobile Security Technologies (MoST ’17), IEEE Security & Privacy Workshops, 21 Dec 2017. IEEE. [178] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette, “Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones” the 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 9 Nov 2017, p. 1-12. [177] Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis and Serge Chaumette, “Serverless Protocols for Inventory and Tracking with a UAV“, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11. [176] Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank and Raja Naeem Akram, “Proximity Assurances Based on Natural and Artificial Ambient Environments“, the 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, (Security and Cryptology; vol. 10543). [175] Iakovos Gurulian, Gerhard Hancke, Konstantinos Markantonakis, and Raja Naeem Akram, “May The Force Be With You: Force-Based Relay Attack Detection”, the 17th Smart Card Research and Advanced Application Conference (CARDIS 2017), Lugano, Switzerland. [174] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron and Serge Chaumette. “A Secure and Trusted Channel Protocol for UAVs Fleets”, to be published in the 11th WISTP International Conference on Information Security Theory and Practices (WISTP2017), Heraklion, Crete, Greece, September 28-29, 2017, Springer. [173] Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis, “EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs“, to be published in the 11th WISTP International Conference on Information Security Theory and Practices (WISTP2017), Heraklion, Crete, Greece, September 28-29, 2017, Springer. [172] Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes, “Philanthropy On The Blockchain“, to be published in the 11th WISTP International Conference on Information Security Theory and Practices (WISTP2017), Heraklion, Crete, Greece, September 28-29, 2017, Springer. [171] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, and Serge Chaumette. “Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones“, the 36th IEEE/AIAA Digital Avionics Systems Conference, St. Petersburg, Florida, USA, September 17-21, IEEE CS. [170] Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes, “Artificial Ambient Environments for Proximity Critical Applications“, ARES ’17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, 29 Aug 2017 [169] Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank and Raja Naeem Akram, “Proximity Assurances Based on Natural and Artificial Ambient Environments“,The 10th International Conference on Innovative Security Solutions for Information Technology and Communications (SECITC ’17). Springer, 9 Jun 2017 [168] Carlton Shepherd, Fabien Petitcolas, Raja Naeem Akram and Konstantinos Markantonakis, “An Exploratory Analysis of the Security Risks of the Internet of Things in Finance”, Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 15 p. (Lecture Notes in Computer Science; vol. 10442) [167] Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis and Serge Chaumette, “Serverless Protocols for Inventory and Tracking with a UAV“, The 36th IEEE/AIAA Digital Avionics Systems Conference. St. Petersburg, Florida, USA: IEEE Computer Society Press 31 Jul 2017 [166] Robert P. Lee, Konstantinos Markantonakis, and Raja Naeem Akram, “Provisioning Software with Hardware-Software Binding“, 12th International Workshop on Frontiers in Availability, Reliability and Security (FARES 2017), Reggio Calabria, Italy, August 29th – September 1st 2017 [165] Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis, “Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments“, 12th International Conference on Availability, Reliability and Security (ARES ’17). ACM. [164] Carlton Shepherd, Fabien Petitcolas, Raja Naeem Akram, and Konstantinos Markantonakis, “An Exploratory Analysis of the Security Risks of the Internet of Things in Finance“, 14th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2017). Springer-Verlag. [163] Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram and Keith Mayes, “On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks“, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). [162] Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, & Emmanouil Panaousis, “The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions” , Mobile Security Technologies (MoST), 2017, IEEE Security & Privacy Workshops (SPW). [161] Martin Kelly, Keith Mayes and John Walker, “Characterising a CPU Fault Attack Model via Run-Time Data Analysis“, IEEE International Symposium on Hardware Oriented Security and Trust (HOST2017), 1-4 May 2017, McLean VA USA [160] Benoit Ducray, Sheila Cobourne, Keith Mayes and Konstantinos Markantonakis, “Comparison of Dynamic Biometric Security Characteristics against other Biometrics“, IEEE International Conference on Communications (IEEE ICC 2017), 21-25 May 2017, Paris, France [159] Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram and Carlton Shepherd, “Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay“, ACM CPSS’17 Program, 3nd ACM Cyber-Physical System Security Workshop, Abu Dhabi, UAE, April 2, 2017: (in conjunction with ACM AsiaCCS’17) [158] Iakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Preventing Relay Attacks in Mobile Transactions Using Infrared Light“, SAC ’17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing, April 2017 [157] Benoit Ducray, Sheila Cobourne, Keith Mayes and Konstantinos Markantonakis, “Gesture Recognition Implemented on a Personal Limited Device“,The International Conference on Information and Communication Systems (ICICS 2017), Irbid, Jordan, April 4-6, 2017
[2016]
[156] Hafizah Mansor, Konstantinos Markantonakis,Raja Naeem Akram, Keith Mayes, and Iakovos Gurulian, “Log your car: Reliable maintenance services record,” in Information Security and Cryptology (Inscrypt), 12th International Conference on, (Beijing, China), Springer, Nov 4-6 2016. [155] Carlton Shepherd, Raja Naeem Akram and Konstantinos Markantonakis, “Towards Trusted Execution of Continuous Authentication Schemes”, Proceedings of 32nd ACM SIGAPP Symposium on Applied Computing, Marrakesh, Morocco, ACM. [154] Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes, “Enhancing EMV Tokenisation with Dynamic Transaction Tokens”, The 12th Workshop on RFID and IoT Security (RFIDSec2016). Springer, 2016. (Lecture Notes in Computer Science (LNCS)). [153] Md Hassan, Konstantinos Markantonakis and Raja Naeem Akram, “Can you call the software in your device firmware?”, The 13th IEEE International Conference on e-Business Engineering (ICEBE 2016), Macau, China, October 2016. [152] Assad Umar, Iakovos Gurulian, Keith Mayes, and Konstantinos Markantonakis, “Tokenisation Blacklisting using Linkable Group Signatures”, 12th EAI International Conference on Security and Privacy in Communication Networks (SECURECOMM) from October 10-12, 2016, Guangzhou, People’s Republic of China [151] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron and Serge Chaumette, “An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks”, in 35th Digital Avionics Systems Conference (IEEE DASC 2016). Roy, A. & Schuster, W. (eds.). Sacramento, CA, USA, IEEE CS, September 2016 [150] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron and Serge Chaumette, “Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks” in 35th Digital Avionics Systems Conference (IEEE DASC 2016). Roy, A. & Schuster, W. (eds.). Sacramento, CA, USA, IEEE CS, September 2016 [149] Raja Naeem Akram, Pierre-Francois Bonnefoi, Serge Chaumette, Konstantinos Markantonakis and Damien Sauveron, “Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements”, in the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y. & Ren, K. (eds.). Tianjin, China, IEEE CS, August 2016 [148] Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron and Emmanuel Conchon, “Secure and Trusted Execution: Past, Present and Future — A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems”, in the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y. & Ren, K. (eds.). Tianjin, China, IEEE CS, August 2016 [147] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, “Recovering from a lost digital wallet: A smart cards perspective extended abstract”, Pervasive and Mobile Computing, Volume 29, July 2016, Pages 113-129, http://dx.doi.org/10.1016/j.pmcj.2015.06.018 [146] Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes and Iakovos Gurulian, “Log Your Car: The non-invasive vehicle forensics”, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), IEEE Computer Society, Tianjin, China, Aug 23-26 2016 [145] Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram and Keith Mayes, “Extending EMV Tokenised Payments To Offline-Environments”, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society. Tianjin, China. August 2016. [144] Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes, “You can’t touch this: Consumer-centric android application repackaging detection”, Future Generation Computer Systems, Volume 65, December 2016, Pages 1-9 [143] Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis,”Secure Application Execution in Mobile Devices”. The New Codebreakers, Ryan, A. Peter Y. and Naccache, David and Quisquater, Jean-Jacques (eds), Springer Berlin Heidelberg, 2016, pages 417-438 [142] Konstantinos Markantonakis and Raja Naeem Akram, “A Secure and Trusted Boot Process for Avionics Wireless Networks”, 16th Integrated Communication, Navigation and Surveillance Conference (ICNS), Aloke Roy (eds.), Herdon, VA, USA, April 2016, IEEE [141] Raja Naeem Akram and Konstantinos Markantonakis, “Challenges of Security and Trust of Mobile Devices as Digital Avionics Component”, 16th Integrated Communication, Navigation and Surveillance Conference (ICNS), Aloke Roy (eds.), Herdon, VA, USA, April 2016, IEEE [140] Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, “Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting”, 2nd ACM Cyber-Physical System Security Workshop (CPSS 2016), Xi’an, China, May 30th 2016 [139] Sarah Abughazalah, Konstantinos Markantonakis and Keith Mayes, “Two rounds RFID grouping-proof protocol,” 2016 IEEE International Conference on RFID (RFID), Orlando, FL, 2016, pp. 1-14, doi: 10.1109/RFID.2016.7488022 [138] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, “A Smart Card Web Server in the Web of Things”, SAI Intelligent Systems Conference 2016 (IntelliSys 2016) London 21-22 September 2016[2015]
[137] Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes, “Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles”, 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, Aug 25-28 2015, IEEE Computer Society [136] Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram and Keith Mayes, “Let’s Get Mobile: Secure FOTA for Automotive Systems”, 9th International Conference on Network and System Security (NSS 2015), New York, USA, Nov 3-5 2015, In LNCS, Springer [135] Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, K. Rantos, and K. Mayes, “Enhancing EMV Online PIN Verification”, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland IEEE CS, August 2015 [134] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, “A Novel Consumer-Centric Card Management Architecture and Potential Security Issues”, Information Sciences, Volume 321, 10 November 2015, Pages 150-161, ISSN 0020-0255, http://dx.doi.org/10.1016/j.ins.2014.12.049 [133] Raja Naeem Akram, Konstantinos Markantonakis, Sharadha Kariyawasam, Shahid Ayub, Amar Seeam, and Robert Atkinson, “Challenges of Security and Trust in Avionics Wireless Networks”, 34th Digital Avionics Systems Conference, Prague, Czech, IEEE CS, September 13–17, 2015 [132] Raja Naeem Akram, Konstantinos Markantonakis, and K. Mayes, “Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks”, 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria, Springer, September 2015 [131] P-F. Bonnefoi, P. Dusart, Damien Sauveron, Raja Naeem Akram & Konstantinos Markantonakis, “A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags”, the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland, IEEE CS, August 2015 [130] Raja Naeem Akram Akram, Konstantinos Markantonakis, Keith Mayes, and Damien Sauveron, “Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures”, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland, IEEE CS, August 2015 [129] Konstantinos Markantonakis, Raja Naeem Akram, and Mehari Msgna, “Secure and Trusted Application Execution on Embedded Devices”, 8th International Conference on Security for Information Technology and Communications, SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, June 2015 [128] Benoit Ducray, Sheila Cobourne, Keith Mayes and Konstantinos Markantonakis, “Authentication Based on a Changeable Biometric using Gesture Recognition with the Kinect”, 8th IAPR International Conference on Biometrics (ICB) 2015, Phuket, Thailand, May 19-22 2015, IEEE Computer Society [127] Assad Umar, Keith Mayes and Konstantinos Markantonakis, “Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element”, First Conference On Mobile And Secure Services (MobiSecServ 2015), Gainesville, Florida USA, 20-21 February 2015 [126] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, “A Novel Consumer-Centric Card Management Architecture and Potential Security Issues”, Information Sciences, Available online 12 January 2015, ISSN 0020-0255, http://dx.doi.org/10.1016/j.ins.2014.12.049[2014]
[125] Danushka Jayasinghe, Konstantinos Markantonakis, and Keith Mayes, “Optimistic Fair-Exchange with Anonymity for Bitcoin Users”, 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). IEEE Computer Society, Guangzhou, China (2014) [124] Hafizah Mansor, Konstantinos Markantonakis, and Keith Mayes, “CAN Bus Risk Analysis Revisit”, In: Naccache, D. and Sauveron, D. Information Security Theory and Practice (WISTP 2014). Securing the Internet of Things p170-179. Springer (2014) [123] Graham Hili, Sheila Cobourne, Keith Mayes, and Konstantinos Markantonakis, “Practical Attacks on Virtual Worlds”, 9th International Conference on Risks and Security of Internet and Systems (CRiSIS 2014), Trento, Italy, 27-29 August 2014, In LNCS, Springer Berlin Heidelberg [122] Raja Naeem Akram, Konstantinos Markantonakis, and Damien Sauveron, “Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager”, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, China, 24-26 September, 2014, IEEE Computer Society [121] Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes, “Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR”, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14), Beijing, China, 24-26 September, 2014, IEEE Computer Society [120] Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes, “Secure Improved Cloud-Based RFID Authentication Protocol”. 9th DPM International Workshop on Data Privacy Management (DPM 2014), Wroclaw, Poland, 10 September, 2014, In LNCS, Springer Berlin Heidelberg [119] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Rethinking the Smart Card Technology”, Invited Paper, 16th International Conference on Human-Computer Interaction, Theo Tryfonas & Ioannis Askoxylakis, ed., Springer, Crete, Greece, June, 2014 [118] Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. “Precise Instruction-Level Side Channel Profiling of Embedded Processors”, 10th Information Security Practice & Experience Conference (ISPEC 2014). In LNCS, Springer. Fuzhou, China. May 5 – 8, 2014 [117] Mehari Msgna, Konstantinos Markantonakis, David Naccache and Keith Mayes. “Verifying Software Integrity in Embedded Systems: A Side Channel Approach”, Constructive Side-Channel Analysis and Secure Design (COSADE 2014). In LNCS, Springer. Paris, France. April 13 – 15, 2014 [116] Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes, “Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains”, Proceedings of The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE-2014), in conjunction with The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria, Canada, May 2014 [115] Sheila Cobourne, Graham Hili, Keith Mayes and Konstantinos Markantonakis, “Avatar Voting in Virtual Worlds”, 5th International Conference on Information and Communication Systems (ICICS 2014), IEEE, Irbid, Jordan, April 2014 [114] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Trusted Platform Module for Smart Cards”, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Omar Alfandi, ed., IEEE CS, Dubai, UAE, March, 2014 [113] Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes and Konstantinos Markantonakis, “Remote e-Voting using the Smart Card Web Server”, Crisis 2012 special edition of International Journal of Secure Software Engineering (IJSSE), IGI Global, 2014[2013]
[112] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Smart Cards: State-of-the-Art to Future Directions, Invited Paper”, in IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013), Christos Douligeris & Dimitrios Serpanos, ed., IEEE Computer Science, Athens, Greece, December, 2013. [111] Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes, “A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA”, Proceedings of The Fifth International Workshop on RFID Security and Cryptography, (RISC 2013), in conjunction with The 8th International Conference for Internet Technology and Secure Transactions, (ICITST 2013), London, UK, December 2013 [110] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. “Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators”. In S. Qing and J. Zhou, editors, 15th International Conference on Information and Communications Security (ICICS 2013), Beijing, China, November 2013. Springer [109] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. “Recovering from Lost Digital Wallet”. In Y. Xiang, F. G. Marmol and S. Ruj, editors, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13), Zhangjiajie, China, November 2013. IEEE CS [108] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. “Remote Attestation Mechanism based on Physical Unclonable Functions”. In J. Zhou, C. Ma and J. Weng, editors, The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia), Guangzhou, China, November 2013. IOS Press [107] Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, 2013, “Virtual World Authentication Using the Smart Card Web Server”. in S Thampi (ed.), Communications in Computer and Information Science. vol. 377, Springer-Verlag, pp. 30-41, International Symposium on Security in Computing and Communications, Mysore, India, 22-24 August [106] Mehari Msgna, Konstantinos Markantonakis and Keith Mayes. “The B-Side of Side Channel Leakage: Control Flow Security In Embedded Systems”. 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013). Springer. Sydney, Australia. September 25-27, 2013 [105] Mehari G. Msgna, Raja Naeem Akram, Konstantinos Markantonakis and Keith Mayes. “Subscriber Centric Conditional Access System for Pay-TV Systems”. 9th Workshop on Service-Oriented Applications, Integration and Collaboration (SOAIC 13) in conjunction with The 10th IEEE International Conference on e-Business Engineering (ICEBE 2013). IEEE Computer Society Press. Coventry, UK. September 11-13, 2013 [104] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model”, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13) Melbourne, Australia, 16-18 July, 2013 [103] Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis, “Card-present Transactions On The Internet Using The Smart Card Web Server” proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13) Melbourne, Australia, 16-18 July, 2013, IEEE Computer Society, 2013. p. 611-619 [102] Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes, “A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags”, 25th IFIP International Information Security Conference (SEC 2013), IFIP AICT Series, Auckland, New Zealand, July 2013. Springer. [101] Sheila Cobourne, Keith Mayes & Konstantinos Markantonakis “Using the Smart Card Web Server in Secure Branchless Banking”, in 7th International Conference on Network and System Security (NSS 2013), J.Lopez, X. Huang and R. Sandhu (Eds.), LNCS 7873, Madrid, Spain, June 3 – 4, 2013, pp 250 – 263. Springer[2012]
[100] Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. “Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones,” In Proc. The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), November 8 – 9, 2012, Taipei, Taiwan. 2012. [99] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes,”Building the Bridges – A Proposal for Merging different Paradigms in Mobile NFC Ecosystem”, in the 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). Guangzhou, China, IEEE Computer Society Press, Nov-2012. [98] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes,”Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture” in the 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Hong Kong, China, Springer(LNCS), Oct-2012 . [97] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong and Konstantinos Markantonakis, “Distributed e-Voting using the Smart Card Web Server”, in the 7th International Conference on Risks and Security of Internet and Systems (CRISIS 2012), Cork, Ireland, October 2012 [96] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “A Privacy Preserving Application Acquisition Protocol,” in 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12), F. G. M. Geyong Min, Ed. Liverpool, United Kingdom: IEEE Computer Science, June 2012. [95] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis,” in 5th International Conference on New Technologies, Mobility and Security (NTMS), A. Mana and M. Klonowski, Eds. Istanbul, Turkey: IEEE Computer Science, May 2012[2011]
[94] Zaheer Ahmad, Keith E. Mayes, Song Dong, Kostas Markantonakis, “Considerations for Mobile Authentication in the Cloud”, Information Security Technical Report 16, 2011, pp 123-130, Elsevier [93] Wei-Dar Chen; Keith. E. Mayes; Yuan-Hung Lien; Jung-Hui Chiu, “NFC Mobile Payment with Citizen Digital certificate”, The 2nd International Conference on Next Generation Information Technology (ICNIT), Gyeongju 21-23 June 2011, IEEE COMPUTER SOC pp. 120 -126. [92] Keith Mayes, Sheila Cobourne, and Konstantinos Markantonakis, “Near Field Technology in Challenging Environments”, Smart Card Technology International – NFC and Contactless, pp.65-69 [91] Damien Sauveron, Konstantinos Markantonakis, Keith Mayes and Christos Verikoukis (Guest Editors), “Security and Resilience for Smart Devices and Applications”, Hindawi Publishing Corporation, EURASIP Journal on Wireless Communications and Networking, Volume 2011 (2011). [90] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Cross-Platform Application Sharing Mechanism”, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), Huaimin Wang, Stephen R. Tate, and Yang Xiang, Changsha, China, IEEE Computer Science, November, 2011. [89] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “User Centric Security Model for Tamper-Resistant Device”, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011), Juanzi Li and Jen-Yao Chung, Beijing, China. IEEE Computer Science, October 2011. [88] Lazaros Kyrillidis, Keith Mayes, and Konstantinos Markantonakis, “Smart Card Web Server”, Electrical Engineering and Applied Computing, Lecture Notes in Electrical Engineering, Vol. 90, Springer, Ao, Sio Iong; Gelman, Len (Eds.), 1st Edition., 2011, XII, 715 p. 258 illus., ISBN 978-94-007-1191-4, Chapter 19, pp.221-232 [87] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Application Binding Protocol in User Centric Smart Card Ownership Model”, 16th Australasian Conference on Information Security and Privacy (ACISP 2011), U. Parampalli and P. Hawkes, Eds. Melbourne, Australia: Springer, July 2011, pp. 208-225[2010]
[86] Jon Hart, Konstantinos Markantonakis and Keith Mayes, “Website Credential Storage and Two-Factor Web Authentication with a Java SIM”, /Workshop in Information Security Theory and Practices (WISTP) 2010/, Lecture Notes in Computer Science 6033, pp. 229–236. IFIP International Federation for Information Processing (2010). [85] Wei-Dar Chen; Gerhard P. Hancke; Keith. E. Mayes; Yuan-Hung Lien; Jung-Hui Chiu, “Using 3G network components to enable NFC mobile transactions and authentication”, 10-12 Dec 2010, 2010 IEEE International Conference on Progress in Informatics and Computing (PIC),IEEE COMPUTER SOC vol.1, p.441 -448. [84] Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis, “Web Server on a SIM Card”, Proceedings of the World Congress on Engineering 2010, International Conference of Computer Science & Engineering, London 30/6 – 2/7 2010, ISBN: 978-988-17012-9-9, pp.253-259 [83] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. Simulator Problem in User Centric Smart Card Ownership Model, In Helen Y Tang and Xinwen Fu, editors, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10), Hong Kong, China, December, IEEE Computer Society [82] Lishoy Francis, Keith Mayes, Gerhard Hancke, and Konstantinos Markantonakis, “A Location Based Security Framework for Authenticating Mobile Phones,” [has been accepted to 2nd International Workshop on Pervasive Mobile and Embedded Computing (M-MPAC 2010) in conjunction with ACM/IFIP/USENIX 11th International Middleware Conference (Middleware 2010], Nov 29-Dec 03, 2010, Bangalore, India. (ACM). [81] Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis, “On the Security Issues of NFC enabled Mobile Phones,” [has been accepted to International Journal of Internet Technology and Secured Transactions (IJITST 2010)] (Inderscience) [80] Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis, “Practical NFC Peer-to-Peer Relay Attack using Mobile Phones”. 6th Workshop on RFID Security (RFIDSec 2010), June 7 – 9, 2010, Istanbul, Turkey. [79] Weidar Chen, Yuanhung Lien, Keith Mayes, Gerhard Hancke and Jung-Hui Chiu. NFC Mobile Transaction and Authentication based on GSM Network. 2nd International Workshop on Near Field Communication (NFC 2010), April 2010. [78] Gerhard Hancke, Konstantinos Markantonakis and Keith Mayes. Security Challenges for User-Oriented RFID Applications within the ‘Internet of Things’. Journal of Internet Technology, 2010. [77] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. In Kai Rannenberg and Vijay Varadharajan, editors, 25th IFIP International Information Security Conference (SEC 2010), IFIP AICT Series, pages 161-171, Brisbane, Australia, September 2010. Springer. [76] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. Firewall Mechanism in a User Centric Smart Card Ownership Model. In Dieter Gollmann, Jean-Louis Lanet, and Julien Iguchi-Cartigny, editors, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, volume 6035/2010 of LNCS, pages 118-132, Passau, Germany, April 2010. Springer. [75] Xuefei Leng, Yuanhung Lien, Keith Mayes and Konstantinos Markantonakis, “An RFID Grouping Proof Protocol Exploiting Anti-collision Algorithm for Subgroup Dividing”, International Journal of Security and Networks (IJSN) Special Issue on “Security and Privacy in RFID Systems”, 2010. [74] Yuanhung Lien, Xuefei Leng, Keith Mayes, and Jung-Hui Chiu, “Select-Response Grouping Proof and Its Verification Protocol for RFID Tags”, International Journal of Intelligent Information and Database Systems, 2010. [73] Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis, “A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions,” [has been accepted to The Sixth Advanced International Conference on Telecommunications (AICT 2010), May 9-15, 2010, Barcelona, Spain [72] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes. A Paradigm Shift in Smart Card Ownership Model. In Bernady O. Apduhan, Osvaldo Gervasi, Andres Iglesias, David Taniar, and Marina Gavrilova, editors, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010), pages 191-200, Fukuoka, Japan, March 2010. IEEE Computer Society.[2009]
[71] Keith Mayes, Konstantinos Markantonakis. Lishoy Francis, Gerhard Hancke “NFC security threats”, Smart Card Technology International, Near Field Communications 2009 ISSN 1361-8288 p42-47. [70] Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis. “Confidence in Smart Token Proximity: Relay Attacks Revisited”, Elsevier Computers & Security, June 2009. [69] Xuefei Leng, Yuanhung Lien, Keith Mayes, Jung-Hui Chiu and Konstantinos Markantonakis. “Select-Response Grouping Proof for RFID Tags”, 1st Asian Conference on Intelligent Information and Database Systems, Quang Binh University, Dong Hoi City, Vietnam, April 2009 [68] Michael Tunstall, Konstantinos Markantonakis, Damien Sauveron, and Keith Mayes, “Smart Cards”, Book Chapter, H. Bidgoli, Ed., Handbook of Technology Management, Wiley. [67] George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, “A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems”, 1st International Workshop on Contactless Security, Fukoka, Japan, March 2009 [66] Gerhard Hancke and Saar Drimer; “Secure Proximity Identification for RFID”, Chapter 9, Security in RFID and Sensor Networks, Zhang and Kitsos (Eds). Auerbach Publications, January 2009. [65] Lishoy Francis,Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis,Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms,” Proceedings of The First International Workshop on RFID Security and Cryptography, (RISC 2009), in conjunction with The 4th International Conference for Internet Technology and Secure Transactions, (ICITST 2009), pp. 1-8, 9-12 Nov, 2009, London,UK. [64] Keith Mayes and Konstantinos Markantonakis, Gerhard Hancke, “Transport ticketing security and fraud controls”, Information Security Technical Report, Volume 14, Pages 87-95, ISSN 1363-4127, Issue 2, May 2009 [63] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Application Management Framework in User Centric Smart Card Ownership Model”, in The 10th International Workshop on Information Security Applications (WISA09), H. Y. YOUM and M. Yung, Eds., vol. 5932/2009. Springer Berlin / Heidelberg: Springer, August 2009, pp. 20-35. [62] Raja Naeem Akram, Konstantinos Markantonakis, and Keith Mayes, “Location Based Application Availability,” in On the Move to Meaningful Internet Systems: OTM 2009 Workshops, P. H. R. Meersman and T. Dillon, Eds., vol. 5872/2009. Springer Berlin / Heidelberg: Springer, November 2009, pp. 128-138.[2008]
[61] Xuefei Leng, Keith Mayes and Konstantinos Markantonakis. “HB-MP+ Protocol: An Improvement on the HB-MP Protocol”, 2008 IEEE International Conference on RFID, April ,2008, Las Vegas, Nevada [60] Yuanhung Lien, Xuefei Leng, Keith Mayes, and Jung-Hui Chiu, “Reading Order Independent Grouping Proof for RFID Tags”, 2008 IEEE International Conference on Intelligence and Security Informatics, June, 2008, Taipei, Taiwan [59] Keith E. Mayes, Konstantinos Markantonakis, “Mobile communication security controllers an evaluation paper, Information Security Technical Report”, Volume 13, Pages 173-192, ISSN 1363-4127, DOI: 10.1016/j.istr.2008.09.004, Issue 3, August 2008 [58] Keith Mayes, Carlos Cid, Konstantinos Markantonakis, “Mifare Classic Security Issues A System Perspective”, Smart card Technology International A Global Journal of Advanced Chip Technology, November 2008, Editor Jeanne Winnet, ISSN 1361-8288. [57] Lishoy Francis, Keith Mayes, Konstantinos Markantonakis, “An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems,” Third International Conference on Convergence and Hybrid Information Technology (ICCIT08), vol. 2, pp.386-395, 2008. November 11-13, 2008, Busan, South Korea,[56] Wael Malek, Keith Mayes and Konstantinos Markantonakis, “Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence”, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, ISSN 0302-9743 Springer September 8-11, 2008, London UK [55] Gerhard Hancke, “Eavesdropping Attacks on High-Frequency RFID Tokens.” 4th Workshop on RFID Security (RFIDSec 2008), Budapest, July 2008. [54] Gerhard Hancke and Markus Kuhn, “Attacks on time-of-flight distance-bounding channels.” Frist ACM Conference on Wireless Network Security (WISEC’08), Alexandria (USA), March 2008. [53] Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Konstantinos Markantonakis (Eds.), “Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks”, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008, Lecture Notes in Computer Science, Vol. 5019, ISBN: 978-3-540-79965-8 [52] Ioannis Askoxylakis, Damien Sauveron, Konstantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis, “A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks”, SECURWARE 2008, will be published by IEEE Computer Society Press and on-line via IEEE XPlore Digital Library. [51] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Ioannis Askoxylakis, “Overview of Security Threats for Smart Cards in the Public Transport Industry”, IEEE International Conference on e-Business Engineering (ICEBE) 2008, 22-24 October 2008, XI AN, China, IEEE Computer Society Conference Publishing Services, Eds jen Yao Chung and Muhammad Younas, ISBN: 978-0-7695-3395-7, IEEE Computer Society Order Number P3395, pp 506-513.
[2007]
[50] Qing Zhang, Konstantinos Markantonakis and Keith Mayes, ‘A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins’, Springer-Verlag, The 3rd International SKLOIS Conference on Information Security and Cryptology (Inscrypt), Xining, China, 1/09/07 [49] Konstantinos Markantonakis, Keith Mayes and Fred Piper, “Smart Cards for Security and Assurance”, Book Chapter, in the “Managing Information Assurance in Financial Services”, April-May 2007 timeframe by Idea Group, Inc., publisher of the Idea Group Publishing, Information Science Publishing, IRM Press, CyberTech Publishing and Idea Group Reference imprints, ISBN: 978-1-59904-171-1. [48] Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, “Smart card Security”, Book Chapter, Springer Verlag, Mobile Robots: The Evolutionary Approach, “Series: Studies in Computational Intelligence”, Vol 50, Nedjah Nadia; Coelho Leandro dos Santos; Mourelle Luiza de Macedo (Eds.) 2007, Vol 50, pp. 205-237, ISBN:978-3-540-49719-6. [47] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Michael Tunstall “Smart Cards: Communication Protocols and Applications”, Book Chapter. [46] Keith Mayes, Konstantinos Markantonakis, “Will smart cards outsmart the criminals?”, The Times Newspaper, Supplement 1, Page 14, 29th January 2007. [45] Kevin Eagles, Konstantinos Markantonakis, Keith Mayes, “A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies”, in Workshop in Information Security Theory and Practices 2007 Smart Cards, Mobile and Ubiquitous Computing Systems (WISTP), Heraklion, Crete, Greece, May 9-11, Lecture Notes in Computer Science (LNCS), Volume 4462, pp198-212. [44] Keith Mayes, Konstantinos Markantonakis, “The Evolution of Mobile Security”, The Silicon Trust Report, February 2007, Issue 1/2007, pp 70-77. [43] Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater, Conference proceedings editors, “Information Security Theory and Practices, Smart cards, Mobile and Ubiquitous Computing Systems”, First IFIP TC6/WG 8.8/ WG 11.2, International Workshop in Information Security Theory and Practices (WISTP) 2007, Heraklion, Crete, Greece, May 2007, Lecture Notes in Computer Science (LNCS), Vol 4462. [42] Lishoy Francis, Keith Mayes and Konstantinos Markantonakis, “On the Future of Accessing Multiple Telecommunication and Network Access Systems from a Single Smart Card”, Chapter for Information Security 2007, Ed. J McKenna, Touch Briefings. Published in 2008. [41] Gerhard Hancke. “Modulating a noisy carrier signal for eavesdropping-resistant HF RFID.” Radio Frequency Identification, e & i (Elektrotechnik und Informationstechnik), Vol. 124, No. 11, pp 404-408, Springer, November 2007. [40] Gerhard Hancke. “Noisy Carrier Modulation for HF RFID.” First International EURASIP Workshop on RFID Technology, Vienna, September 2007.
[2006]
[39] Qing Zhang, Konstantinos Markantonakis and Keith Mayes, “A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery”, In Proceedings of the IEEE International Conference on Computer Systems and Applications (AICCSA ’06). IEEE Computer Society, Washington, DC, USA, 851-858. DOI=10.1109/AICCSA.2006.205188 [38] Qing Zhang, Konstantinos Markantonakis and Keith Mayes, “A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol”, The IEEE Joint Conference on E-Commerce Technology(CEC ’06) and Enterprise Computing, E-Commerce and E-Services (EEE ’06) (CEC/EEE 2006), 26-29 June 2006, California, USA, proceedings published in the regular conference proceedings by the IEEE Computer Society Press, PP 147-154, ISBN: 0-7695-2511-3, Digital Object Identifier: 10.1109/CEC-EEE.2006 [37] Keith Mayes, Konstantinos Markantonakis, and William G. Sirett, “A behavioural approach to smart card application monitoring”, Smart Card Technology International, 2005:130-131, Jan 2006. The global journal of advanced card technology, Editor Mark Locke. [36] William G. Sirett, John A. MacDonald, Keith Mayes and Konstantinos Markantonakis, “Design, Installation & Execution of a Security Agent for Mobile Stations”, 7th Smart Card Research and Advanced Application IFIP Conference (CARDIS’06), Tarragona, CAT, Spain, April 19-21, 2006. [35] William G. Sirett, John A. MacDonald, Keith Mayes and Konstantinos Markantonakis, “Secure Deployment of Applications to Fielded Devices and Smart Cards”, The 4th International Workshop on Security in Information System (WOSIS 2006). Institute for Systems and Technologies of Information, Control and Communication, May 2006. ICEIS 2006, Paphos, Cyprus. [34] Konstantinos Markantonakis, Keith Mayes and Fred Piper, “Smart Cards for Security and Assurance”, BOOK CHAPTER, Managing Information Assurance in Financial Services”, which will be published the Idea Group Publishing, Information Science Publishing, IRM Press, CyberTech Publishing and Idea Group Reference imprints. [33] Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Fred Piper, “Smart card Security”, BOOK CHAPTER, Computational Intelligence in Information Assurance and Security, Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (Eds.), Spinger Verlag, [32] Damien Sauveron, Pierre Dusart, Armelle Trotin, Konstantinos Markantonakis, Keith Mayes, “Security Evaluation and Certification Process”, BOOK CHAPTER, Computational Intelligence in Information Assurance and Security, Nadia Nedjah, Ajith Abraham, Luiza de Macedo Mourelle (Eds.), Spinger Verlag, under development. [31] Konstantinos Markantonakis, William G. Sirett, Keith Mayes, “Security of Open Satellite TV Receivers”, 7th Edition of e-smart conference and demos, September 20-22, 2006 – Sophia Antipolis, French Riviera, France, [30] Keith Mayes, Konstantinos Markantonakis, “On the Potential of High Density Smart Cards”, Computers & Security (2006), p.p. 147-156, Elsevier Issue. [29] Michael Tunstall, Konstantinos Markantonakis, and Keith Mayes, “Inhibiting Card Sharing Attacks”, IWSEC2006 , Kyoto, Japan, October 23 – 24, 2006. Proceedings will be published in a special volume of Springer LNCS (Lecture Notes in Computer Science). [28] William G. Sirett, Konstantinos Markantonakis, and Keith Mayes, “Temporally Aware Behaviour-Based Security in Smart Cards”, In proceedings of 2006 International Conference on Computational Intelligence and Security (CIS 2006), IEEE Xplore. IEEE, Nov 2006. Guangzhou, China. [27] William G. Sirett, Konstantinos Markantonakis, and Keith Mayes, “Implementation of Temporally Aware Behaviour-Based Security in Smart Cards”, In 1st International Workshop on Secure Information Systems (SIS ’06), volume XXII of Autumn Meetings of the Polish Information Processing Society (PIPS) conference CD with ISBN and also in the Journal of Information Assurance and Security, Nov 2006, Wisla, Poland. [26] William G. Sirett, John A. MacDonald, Keith Mayes and Konstantinos Markantonakis, “Design, Installation & Execution of a Security Agent for Mobile Stations”, In J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors, Smart Card Research and Advanced Applications – Proceedings of the Seventh IFIP WG 8.8/11.2 International Conference, CARDIS 2006, volume 3928 of Springer LNCS (Lecture Notes in Computer Science), pages 1-15. Spinger-Verlag, April 2006. Tarragona, CAT, Spain. ISBN: 3-540-33311-8 [25] Keith Mayes, Konstantinos Markantonakis, and William G. Sirett, “A behavioural approach to smart card application monitoring”, Smart Card Technology International, The Global Journal of Advanced Card Technology, Editor Mark Locke, 2006, pp130-133, Jan 2006, ISSN:1361-8288. [24] William G. Sirett, John A. MacDonald, Keith Mayes and Konstantinos Markantonakis, “Secure Deployment of Applications to Fielded Devices and Smart Cards”, In E. Fernandez-Medina and M. I.Yague, editors, Security in Information Systems – Proceedings of the Fourth International Workshop on Security in Information System (WOSIS 2006), pages 195-206. INSTICC Press, May 2006. Paphos, Cyprus. ISBN:972-8865-52-X [23] Konstantinos Markantonakis, Michael Tunstall, Keith Mayes, “Security of Open Satellite TV Receivers”, 7th Edition of e-smart conference and demos, September 20-22, 2006 – Sophia Antipolis, French Riviera, France. [22] Keith Mayes, Konstantinos Markantonakis, “On the Potential of High Density Smart Cards”, Information Security Technical Report, Vol 11, Issue 3, Pages 147-15, Elsevier. [21] Michael Tunstall, Konstantinos Markantonakis, and Keith Mayes, “Inhibiting Card Sharing Attacks”, In H. Yoshiura, K. Sakurai, K. Rannenberg, Y. Murayama, and S. Kawamura, Eds., Advances in Information Security and Computer Science, 1st International Workshop on Security, IWSEC2006, vol. 4266 of Springer LNCS (Lecture Notes in Computer Science), pp. 239-251, Springer-Verlag, 2006. [20] Serge Chaumette, Konstantinos Markantonakis, Keith Mayes, and Damien Sauveron, “The Mobile Java Card Grid Project”, 7th Edition of e-smart conference and demos, September 20-22, 2006 – Sophia Antipolis, French Riviera, France. [19] William G. Sirett, Konstantinos Markantonakis, and Keith Mayes, “Temporally Aware Behaviour-Based Security in Smart Cards”, In proceedings of 2006 International Conference on Computational Intelligence and Security (CIS 2006), Guangzhou, China, in Yiu–Ming Cheung and Yuping Wang and Hailin Liu, Nov 2006, IEEE Xplore, ISBN:
1-4244-0604-8, pp 604-608. [18] William G. Sirett, Konstantinos Markantonakis, and Keith Mayes, “Implementation of Temporally Aware Behaviour-Based Security in Smart Cards”, In 1st International Workshop on Secure Information Systems (SIS ’06), volume XXII of Autumn Meetings of the Polish Information Processing Society (PIPS) conference CD with ISBN and also in the Journal of Information Assurance and Security, Nov 2006, Wisla, Poland. [17] Keith Mayes, Konstantinos Markantonakis, and Calvin Chen, “Smart card Platform-Fingerprinting “, Smart Card Technology International, The Global Journal of Advanced Card Technology, Editor Mark Locke, Oct 2006, pp78-82, Oct 2006, ISSN:1361-8288.
[2005]
[16] Konstantinos Papapanagiotou, Konstantinos Markantonakis, Qing Zhang, William Sirett, Keith Mayes, “On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation”, Security and Privacy in the Age of Ubiquitous Computing. eds Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, Hiroshi Yoshiura. Vol. 181 Springer Boston, 2005. p. 551-563 (IFIP Advances in Information and Communication Technology). [15] Qing Zhang, Keith Mayes, Konstantinos Markantonakis, “A user-centric m-payment solution,” Mobile Technology, Applications and Systems, 2005 2nd International Conference on , vol., no., pp.8 pp.-8, 15-17 Nov. 2005 doi: 10.1109/MTAS.2005.207134 [14] Qing Zhang, Keith Mayes, Konstantinos Markantonakis. A fair biometric enabled m-payment solution with anonymity support. In Proceedings of the International Workshop on Information Security Applications (WISA 2005), Lecture Notes in Computer Science, Springer Verlag. Zhang, Q. & Mayes, K. 2005 A User-Centric Solution To Realise M-Payment. Belgium WEWORC 2005 http://www.cosic.esat.kuleuven.be/weworc/allAbstracts.pdf [13] Qing Zhang, “A User-Centric Solution To Realize M-Payment”, Western European Workshop on Research in Cryptology 2005 (WEWoRC 2005), Springer Verlag (LNCS). [12] Lishoy Francis, William G. Sirett, Konstantinos Markantonakis, Keith Mayes, “Countermeasures for Attacks on Satellite TV Cards using Open Receivers”, Third Australasian Information Security Workshop (AISW2005): Digital Rights Management. [11] John A. MacDonald, William G. Sirett, Chris J. Mitchell, “Overcoming Channel Bandwidth Constraints in Secure SIM Applications”, 20th IFIP International Information Security Conference (Sec 2005) – Small Systems Security and Smart cards, Makuhari-Messe, Chiba, Japan, 31 May 2005.[2004]
[10] Qing Zhang, Joao Nobrega Brites-Moita, Keith Mayes, Konstantinos Markantonakis. “The Secure and Multiple Payment System based on the Mobile Phone Platform”, In: Workshop on Information Security Applications(WISA 2004) http://dasan.sejong.ac.kr/wisa04 [9] Konstantinos Markantonakis, Keith Mayes, “Smart Card Technology in the Public Transport Industry”, Secure Magazine – The Silicon Trust Report, February 2004, Issue 1/2004, pp 26-29. [8] Konstantinos Markantonakis, Keith Mayes, “A Secure Channel protocol for multi-application smart cards based on public key cryptography”, CMS 2004 – Eight IFIP TC-6-11 Conference on Communications and Multimedia Security, 15-18 September 2004, published by Kluwer Academic Publishers.[7] Keith Mayes, Mohammed Alhussein, Konstantinos Markantonakis, “Increasing Awareness of Smart card System Security Issues”, Smart Card Technology International Journal, 2004, Editor Mark Locke.
[2003]
[6] Konstantinos Markantonakis, Keith Mayes, “An Overview of GlobalPlatform Card Specification”, Elsevier Information Security Technical Report, Volume 8, No. 1, pp.17-29 (2003), ISSN:1363-4127. [5]Keith Mayes, Konstantinos Markantonakis, “Are we smart about Security?”, Elsevier Information Security Technical Report, Volume 8, No 1, pp.6-16(2003), ISSN 1363-4127 [4] Konstantinos Rantos, Konstantinos Markantonakis, “An Asymmetric Cryptography Secure Channel Protocol for Smart Cards”, 19th IFIP International Information Security Conference – TC11 – Security and Protection in Information Processing Systems, WWC2004, 22-27 August 2004 Toulouse France, published by Kluwer Academic Publishers. [3] Konstantinos Markantonakis, Keith Mayes, “Overview of Security Threats for Smart cards in the Public Transport Industry”, to be submitted for conference review. [2] Keith Mayes, Konstantinos Markantonakis, “The Smart Card Centre at Royal Holloway University of London”, Secure – the Silicon Trust Report Issue No1(2003) [1] Keith Mayes, Konstantinos Markantonakis, “Smart Cards: Enabling e-Government”, The Global Journal of Advanced Card Technology, Smart Card Technology International, Dec 2003, pp.66-70.