default search action
Konstantinos Markantonakis
Person information
- affiliation: Royal Holloway, University of London, Egham, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b1]Carlton Shepherd, Konstantinos Markantonakis:
Trusted Execution Environments. Springer 2024, ISBN 978-3-031-55560-2, pp. 1-196 - [j28]Konstantinos Markantonakis, Julia A. Meister, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram, Sarah Hani Abu Ghazalah, Mumraiz Kasi, Damien Sauveron, Gerhard P. Hancke:
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access 12: 150372-150386 (2024) - [j27]Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis:
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices. IEEE Trans. Dependable Secur. Comput. 21(4): 3141-3152 (2024) - [c117]Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd:
ZKP Enabled Identity and Reputation Verification in P2P Marketplaces. Blockchain 2024: 591-598 - [e8]Nikolaos Pitropakis, Sokratis K. Katsikas, Steven Furnell, Konstantinos Markantonakis:
ICT Systems Security and Privacy Protection - 39th IFIP International Conference, SEC 2024, Edinburgh, UK, June 12-14, 2024, Proceedings. IFIP Advances in Information and Communication Technology 710, Springer 2024, ISBN 978-3-031-65174-8 [contents] - [i25]Zhanyu Sha, Carlton Shepherd, Amir Rafi, Konstantinos Markantonakis:
Control-Flow Attestation: Concepts, Solutions, and Open Challenges. CoRR abs/2408.06304 (2024) - 2023
- [j26]Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. IEEE Trans. Computers 72(7): 2065-2079 (2023) - [c116]Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. TrustCom 2023: 549-558 - [i24]Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. CoRR abs/2308.00437 (2023) - 2022
- [j25]Fabien Thomas-Brans, Thibaut Heckmann, Konstantinos Markantonakis, Damien Sauveron:
New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards. IEEE Access 10: 33742-33757 (2022) - [i23]Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. CoRR abs/2204.11639 (2022) - 2021
- [j24]Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Comput. Secur. 111: 102471 (2021) - [j23]Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [c115]Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. SP (Workshops) 2021: 221-227 - [i22]Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. CoRR abs/2102.08804 (2021) - [i21]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. CoRR abs/2103.08229 (2021) - [i20]Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd, Benjamin Semal:
A DLT-based Smart Contract Architecture for Atomic and Scalable Trading. CoRR abs/2105.02937 (2021) - [i19]Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache:
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey. CoRR abs/2105.04454 (2021) - [i18]Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis:
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices. CoRR abs/2110.06363 (2021) - [i17]Vihangi Vagal, Konstantinos Markantonakis, Carlton Shepherd:
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles. CoRR abs/2110.09453 (2021) - 2020
- [j22]Qiao Hu, Bianxia Du, Konstantinos Markantonakis, Gerhard P. Hancke:
A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement. IEEE Trans. Ind. Informatics 16(1): 691-702 (2020) - [c114]Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. ACNS Workshops 2020: 360-377 - [c113]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. AsiaCCS 2020: 471-480 - [c112]Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems. SEC 2020: 3-16 - [c111]Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner:
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud. TrustCom 2020: 328-336 - [e7]Konstantinos Markantonakis, Marinella Petrocchi:
Security and Trust Management - 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings. Lecture Notes in Computer Science 12386, Springer 2020, ISBN 978-3-030-59816-7 [contents]
2010 – 2019
- 2019
- [j21]Thibaut Heckmann, James P. McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache:
Removing epoxy underfill between neighbouring components using acid for component chip-off. Digit. Investig. 29: 198-209 (2019) - [j20]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices. ACM Trans. Embed. Comput. Syst. 18(3): 26:1-26:21 (2019) - [c110]Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins:
Location Tracking Using Smartphone Accelerometer and Magnetometer Traces. ARES 2019: 96:1-96:9 - 2018
- [j19]Thibaut Heckmann, Konstantinos Markantonakis, David Naccache, Thomas R. Souvignet:
Forensic smartphone analysis using adhesives: Transplantation of Package on Package components. Digit. Investig. 26: 29-39 (2018) - [j18]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". Future Gener. Comput. Syst. 80: 537-545 (2018) - [c109]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network. iThings/GreenCom/CPSCom/SmartData 2018: 1057-1062 - [c108]Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis:
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. iThings/GreenCom/CPSCom/SmartData 2018: 1561-1567 - [c107]Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. TrustCom/BigDataSE 2018: 481-489 - [c106]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance. TrustCom/BigDataSE 2018: 1342-1347 - [c105]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. TrustCom/BigDataSE 2018: 1380-1385 - [c104]Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis:
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. WISTP 2018: 129-144 - [c103]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Remote Credential Management with Mutual Attestation for Trusted Execution Environments. WISTP 2018: 157-173 - [i16]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs. CoRR abs/1804.10707 (2018) - [i15]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. CoRR abs/1805.04747 (2018) - [i14]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance. CoRR abs/1805.05844 (2018) - [i13]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. CoRR abs/1805.10258 (2018) - [i12]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
An evaluation of the security of the Bitcoin Peer-to- Peer Network. CoRR abs/1805.10259 (2018) - [i11]Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis:
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. CoRR abs/1812.00190 (2018) - 2017
- [c102]Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. ARES 2017: 5:1-5:10 - [c101]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. ARES 2017: 7:1-7:10 - [c100]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Provisioning Software with Hardware-Software Binding. ARES 2017: 49:1-49:9 - [c99]Iakovos Gurulian, Gerhard P. Hancke, Konstantinos Markantonakis, Raja Naeem Akram:
May the Force Be with You: Force-Based Relay Attack Detection. CARDIS 2017: 142-159 - [c98]Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram:
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. CPSS@AsiaCCS 2017: 21-32 - [c97]Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Comparison of dynamic biometrie security characteristics against other biometrics. ICC 2017: 1-7 - [c96]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Towards trusted execution of multi-modal continuous authentication schemes. SAC 2017: 1444-1451 - [c95]Iakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Preventing relay attacks in mobile transactions using infrared light. SAC 2017: 1724-1731 - [c94]Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram:
Proximity Assurances Based on Natural and Artificial Ambient Environments. SECITC 2017: 83-103 - [c93]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c92]Carlton Shepherd, Fabien A. P. Petitcolas, Raja Naeem Akram, Konstantinos Markantonakis:
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. TrustBus 2017: 164-179 - [c91]Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - [c90]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette:
A Secure and Trusted Channel Protocol for UAVs Fleets. WISTP 2017: 3-24 - [c89]Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Philanthropy on the Blockchain. WISTP 2017: 25-38 - [c88]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. WISTP 2017: 75-92 - [p13]Konstantinos Markantonakis, Raja Naeem Akram:
Multi-Application Smart Card Platforms and Operating Systems. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 59-92 - [p12]Konstantinos Markantonakis, David Main:
Smart Cards for Banking and Finance. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 129-153 - [p11]Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis:
Smart Card Reader and Mobile APIs. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 305-349 - [e6]Keith Mayes, Konstantinos Markantonakis:
Smart Cards, Tokens, Security and Applications, Second Edition. Springer 2017, ISBN 978-3-319-50498-8 [contents] - [e5]Gerhard P. Hancke, Konstantinos Markantonakis:
Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10155, Springer 2017, ISBN 978-3-319-62023-7 [contents] - [i10]Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette:
Serverless Protocols for Inventory and Tracking with a UAV. CoRR abs/1708.05417 (2017) - [i9]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette:
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. CoRR abs/1708.05732 (2017) - [i8]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. CoRR abs/1712.03943 (2017) - 2016
- [j17]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
You can't touch this: Consumer-centric android application repackaging detection. Future Gener. Comput. Syst. 65: 1-9 (2016) - [j16]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
Recovering from a lost digital wallet: A smart cards perspective extended abstract. Pervasive Mob. Comput. 29: 113-129 (2016) - [c87]Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Application Execution in Mobile Devices. The New Codebreakers 2016: 417-438 - [c86]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting. CPSS@AsiaCCS 2016: 70-81 - [c85]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. Inscrypt 2016: 484-504 - [c84]Rashedul Hassan, Konstantinos Markantonakis, Raja Naeem Akram:
Can You Call the Software in Your Device be Firmware? ICEBE 2016: 188-195 - [c83]Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
A Smart Card Web Server in the Web of Things. IntelliSys (2) 2016: 769-784 - [c82]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Two rounds RFID grouping-proof protocol. IEEE RFID 2016: 161-174 - [c81]Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Enhancing EMV Tokenisation with Dynamic Transaction Tokens. RFIDSec 2016: 107-122 - [c80]Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis:
Tokenisation Blacklisting Using Linkable Group Signatures. SecureComm 2016: 182-198 - [c79]Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. Trustcom/BigDataSE/ISPA 2016: 168-177 - [c78]Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. Trustcom/BigDataSE/ISPA 2016: 443-450 - [c77]Raja Naeem Akram, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. Trustcom/BigDataSE/ISPA 2016: 606-614 - [c76]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. Trustcom/BigDataSE/ISPA 2016: 974-982 - [i7]Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes:
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments. CoRR abs/1601.07101 (2016) - [i6]Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. CoRR abs/1605.00425 (2016) - [i5]Raja Naeem Akram, Konstantinos Markantonakis:
Challenges of Security and Trust of Mobile Devices as Digital Avionics Component. CoRR abs/1605.00446 (2016) - [i4]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks. CoRR abs/1608.04115 (2016) - [i3]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. CoRR abs/1608.04116 (2016) - 2015
- [j15]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
A novel consumer-centric card management architecture and potential security issues. Inf. Sci. 321: 150-161 (2015) - [c75]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. ARES 2015: 139-148 - [c74]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. ESORICS (2) 2015: 541-560 - [c73]Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Authentication based on a changeable biometric using gesture recognition with the Kinect™. ICB 2015: 38-45 - [c72]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Let's Get Mobile: Secure FOTA for Automotive System. NSS 2015: 503-510 - [c71]Konstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna:
Secure and Trusted Application Execution on Embedded Devices. SECITC 2015: 3-24 - [c70]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, Keith Mayes:
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. TrustCom/BigDataSE/ISPA (1) 2015: 483-490 - [c69]Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis:
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 612-620 - [c68]Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes:
Enhancing EMV Online PIN Verification. TrustCom/BigDataSE/ISPA (1) 2015: 808-817 - 2014
- [j14]Damien Sauveron, Konstantinos Markantonakis, Christos V. Verikoukis:
Security and resilience for smart devices and applications. EURASIP J. Wirel. Commun. Netw. 2014: 123 (2014) - [j13]Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis:
Remote E-Voting Using the Smart Card Web Server. Int. J. Secur. Softw. Eng. 5(1): 39-60 (2014) - [c67]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. AINA Workshops 2014: 871-878 - [c66]Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes:
Verifying Software Integrity in Embedded Systems: A Side Channel Approach. COSADE 2014: 261-280 - [c65]Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Practical Attacks on Virtual Worlds. CRiSIS 2014: 180-195 - [c64]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Improved Cloud-Based RFID Authentication Protocol. DPM/SETOP/QASA 2014: 147-164 - [c63]Raja Naeem Akram, Konstantinos Markantonakis:
Rethinking the Smart Card Technology. HCI (24) 2014: 221-232 - [c62]Danushka Jayasinghe, Konstantinos Markantonakis, Keith Mayes:
Optimistic Fair-Exchange with Anonymity for Bitcoin Users. ICEBE 2014: 44-51 - [c61]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
Precise Instruction-Level Side Channel Profiling of Embedded Processors. ISPEC 2014: 129-143 - [c60]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Trusted Platform Module for Smart Cards. NTMS 2014: 1-5 - [c59]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. TrustCom 2014: 422-431 - [c58]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. TrustCom 2014: 448-456 - [c57]Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes:
CAN Bus Risk Analysis Revisit. WISTP 2014: 170-179 - [p10]Keith Mayes, Konstantinos Markantonakis:
An Introduction to Smart Cards and RFIDs. Secure Smart Embedded Devices, Platforms and Applications 2014: 3-25 - [p9]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to the Trusted Platform Module and Mobile Trusted Module. Secure Smart Embedded Devices, Platforms and Applications 2014: 71-93 - [p8]Keith Mayes, Konstantinos Markantonakis:
Information Security Best Practices. Secure Smart Embedded Devices, Platforms and Applications 2014: 119-144 - [p7]Keith Mayes, Konstantinos Markantonakis:
Mobile Communication Security Controllers. Secure Smart Embedded Devices, Platforms and Applications 2014: 227-266 - [p6]Konstantinos Rantos, Konstantinos Markantonakis:
Analysis of Potential Vulnerabilities in Payment Terminals. Secure Smart Embedded Devices, Platforms and Applications 2014: 311-333 - [p5]Graham Hili, Keith Mayes, Konstantinos Markantonakis:
The BIOS and Rootkits. Secure Smart Embedded Devices, Platforms and Applications 2014: 369-381 - [p4]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to Java Card Programming. Secure Smart Embedded Devices, Platforms and Applications 2014: 497-513 - [p3]Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications. Secure Smart Embedded Devices, Platforms and Applications 2014 - [p2]Konstantinos Markantonakis, Keith Mayes:
Errata to: Secure Smart Embedded Devices, Platforms and Applications. Secure Smart Embedded Devices, Platforms and Applications 2014 - [e4]Konstantinos Markantonakis, Keith Mayes:
Secure Smart Embedded Devices, Platforms and Applications. Springer 2014, ISBN 978-1-4614-7914-7 [contents] - 2013
- [j12]Seungmin Rho, Damien Sauveron, Konstantinos Markantonakis:
Editorial: advanced semantic and social multimedia technologies for future computing environment. Multim. Tools Appl. 64(2): 219-225 (2013) - [c56]Behrang Fouladi, Konstantinos Markantonakis, Keith Mayes:
Vulnerability Analysis of a Commercial .NET Smart Card. CARDIS 2013: 125-139 - [c55]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Recovering from a Lost Digital Wallet. HPCC/EUC 2013: 1615-1621 - [c54]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram:
Subscriber Centric Conditional Access System for Pay-TV Systems. ICEBE 2013: 450-455 - [c53]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. ICICS 2013: 151-166 - [c52]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. ICITST 2013: 44-51 - [c51]Raja Naeem Akram, Konstantinos Markantonakis:
Smart cards: State-of-the-art to future directions. ISSPIT 2013: 154-162 - [c50]Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Using the Smart Card Web Server in Secure Branchless Banking. NSS 2013: 250-263 - [c49]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions. RFIDSec Asia 2013: 107-121 - [c48]Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes:
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. SEC 2013: 102-110 - [c47]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes:
The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. SecureComm 2013: 288-304 - [c46]Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis:
Virtual World Authentication Using the Smart Card Web Server. SSCC 2013: 30-41 - [c45]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. TrustCom/ISPA/IUCC 2013: 336-345 - [c44]Lazaros Kyrillidis, Keith Mayes, Boris Chazalet, Konstantinos Markantonakis:
Card-Present Transactions on the Internet Using the Smart Card Web Server. TrustCom/ISPA/IUCC 2013: 611-619 - 2012
- [c43]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. CIS 2012: 646-652 - [c42]Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Distributed e-voting using the Smart Card Web Server. CRiSIS 2012: 1-8 - [c41]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. ICICS 2012: 214-227 - [c40]Xuefei Leng, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Tag Group Authentication Using Bit-Collisions. ISSA 2012: 1-8 - [c39]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. NTMS 2012: 1-7 - [c38]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. RFIDSec Asia 2012: 21-32 - [c37]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. TrustCom 2012: 383-392 - 2011
- [j11]Zaheer Ahmad, Keith Mayes, Song Dong, Konstantinos Markantonakis:
Considerations for mobile authentication in the Cloud. Inf. Secur. Tech. Rep. 16(3-4): 123-130 (2011) - [c36]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application-Binding Protocol in the User Centric Smart Card Ownership Model. ACISP 2011: 208-225 - [c35]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
User Centric Security Model for Tamper-Resistant Devices. ICEBE 2011: 168-177 - [c34]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. TrustCom 2011: 597-605 - [i2]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. IACR Cryptol. ePrint Arch. 2011: 618 (2011) - 2010
- [j10]Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis:
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing. Int. J. Secur. Networks 5(2/3): 79-86 (2010) - [c33]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions. AICT 2010: 452-461 - [c32]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Firewall Mechanism in a User Centric Smart Card Ownership Model. CARDIS 2010: 118-132 - [c31]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Simulator Problem in User Centric Smart Card Ownership Model. EUC 2010: 679-686 - [c30]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Paradigm Shift in Smart Card Ownership Model. ICCSA Workshops 2010: 191-200 - [c29]Lishoy Francis, Keith Mayes, Gerhard P. Hancke, Konstantinos Markantonakis:
A location based security framework for authenticating mobile phones. M-MPAC@Middleware 2010: 5 - [c28]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. RFIDSec 2010: 35-49 - [c27]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. SEC 2010: 161-172 - [c26]Jonathan Hart, Konstantinos Markantonakis, Keith Mayes:
Website Credential Storage and Two-Factor Web Authentication with a Java SIM. WISTP 2010: 229-236 - [e3]Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron:
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6033, Springer 2010, ISBN 978-3-642-12367-2 [contents] - [i1]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones. IACR Cryptol. ePrint Arch. 2010: 228 (2010)
2000 – 2009
- 2009
- [j9]Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Confidence in smart token proximity: Relay attacks revisited. Comput. Secur. 28(7): 615-627 (2009) - [j8]Konstantinos Markantonakis, Michael Tunstall, Gerhard P. Hancke, Ioannis G. Askoxylakis, Keith Mayes:
Attacking smart card systems: Theory and practice. Inf. Secur. Tech. Rep. 14(2): 46-56 (2009) - [j7]Keith Mayes, Konstantinos Markantonakis, Gerhard P. Hancke:
Transport ticketing security and fraud controls. Inf. Secur. Tech. Rep. 14(2): 87-95 (2009) - [c25]George Poulopoulos, Konstantinos Markantonakis, Keith Mayes:
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. ARES 2009: 706-711 - [c24]Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu:
Select-Response Grouping Proof for RFID Tags. ACIIDS 2009: 73-77 - [c23]Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. ICITST 2009: 1-8 - [c22]Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theodore Tryfonas, John May, Apostolos Traganitis:
A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. MOBILIGHT 2009: 103-113 - [c21]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Location Based Application Availability. OTM Workshops 2009: 128-138 - [c20]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application Management Framework in User Centric Smart Card Ownership Model. WISA 2009: 20-35 - 2008
- [j6]Keith Mayes, Konstantinos Markantonakis:
Mobile communication security controllers an evaluation paper. Inf. Secur. Tech. Rep. 13(3): 173-192 (2008) - [c19]Wael William Zakhari Malek, Keith Mayes, Constantinos Markantonakis:
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. CARDIS 2008: 118-132 - [c18]Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Ioannis G. Askoxylakis:
Overview of Security Threats for Smart Cards in the Public Transport Industry. ICEBE 2008: 506-513 - [c17]Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis:
A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. SECURWARE 2008: 193-202 - [e2]Jose Antonio Onieva, Damien Sauveron, Serge Chaumette, Dieter Gollmann, Constantinos Markantonakis:
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings. Lecture Notes in Computer Science 5019, Springer 2008, ISBN 978-3-540-79965-8 [contents] - 2007
- [c16]Constantinos Markantonakis, Keith Mayes:
Problems and Prospects of Multi Application Smart cards in the UK Financial Industry. ICEBE 2007: 447-452 - [c15]Kevin Eagles, Constantinos Markantonakis, Keith Mayes:
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. WISTP 2007: 161-174 - [p1]Constantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper:
Smart Card Security. Computational Intelligence in Information Assurance and Security 2007: 201-233 - [e1]Damien Sauveron, Constantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater:
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings. Lecture Notes in Computer Science 4462, Springer 2007, ISBN 978-3-540-72353-0 [contents] - 2006
- [j5]Keith Mayes, Konstantinos Markantonakis:
On the potential of high density smart cards. Inf. Secur. Tech. Rep. 11(3): 147-153 (2006) - [c14]Qing Zhang, Konstantinos Markantonakis, Keith Mayes:
Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery. AICCSA 2006: 851-858 - [c13]William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Design, Installation and Execution of a Security Agent for Mobile Stations. CARDIS 2006: 1-15 - [c12]Michael Tunstall, Constantinos Markantonakis, Keith Mayes:
Inhibiting Card Sharing Attacks. IWSEC 2006: 239-251 - [c11]William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis:
Secure Deployment of Applications to Fielded Devices and Smart Cards. WOSIS 2006: 195-206 - [c10]Qing Zhang, Constantinos Markantonakis, Keith Mayes:
A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol. CEC/EEE 2006: 20 - 2005
- [c9]Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis:
Countermeasures for Attacks on Satellite TV Cards using Open Receivers. ACSW 2005: 153-158 - [c8]K. Papapanagiotou, Constantinos Markantonakis, Qing Zhang, William G. Sirett, Keith Mayes:
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. SEC 2005: 551-564 - 2004
- [c7]Konstantinos Markantonakis, Keith Mayes:
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography. Communications and Multimedia Security 2004: 79-95 - [c6]Konstantinos Rantos, Constantinos Markantonakis:
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. SEC 2004: 351-366 - 2003
- [j4]Keith Mayes, Konstantinos Markantonakis:
Are we smart about security? Inf. Secur. Tech. Rep. 8(1): 6-16 (2003) - [j3]Konstantinos Markantonakis, Keith Mayes:
An overview of the GlobalPlatform smart card specification. Inf. Secur. Tech. Rep. 8(1): 17-29 (2003) - 2001
- [c5]Constantinos Markantonakis:
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? SEC 2001: 77-92
1990 – 1999
- 1999
- [j2]Constantinos Markantonakis:
Interfacing with smartcard applications - (ThOpen Card Framework and PC/SC). Inf. Secur. Tech. Rep. 4(2): 69-77 (1999) - [c4]Constantinos Markantonakis, Simeon Xenitellis:
Implementing a Secure Log File Download Manager for the Java Card. Communications and Multimedia Security 1999: 143-162 - [c3]Constantinos Markantonakis:
Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. ICICS 1999: 230-243 - 1998
- [j1]Constantinos Markantonakis:
Java card technology and security. Inf. Secur. Tech. Rep. 3(2): 82-89 (1998) - [c2]Constantinos Markantonakis:
Secure Log File Download Mechanisms for Smart Cards. CARDIS 1998: 285-304 - 1997
- [c1]Constantinos Markantonakis:
The Case for a Secure Multi-Application Smart Card Operating System. ISW 1997: 188-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint