Total number of publications: 211

[211] Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis, "Investigating Black-Box Function Recognition Using Hardware Performance Counters", 27 Nov 2022, IEEE Transactions on Computers, https://arxiv.org/abs/2204.11639

[210] Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis, "A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices", 22 Mar 2022, https://arxiv.org/abs/2110.06363

[209] F Thomas-Brans, Thibaut Heckmann, Konstantinos Markantonakis, Damien Sauveron, "New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards", 11 Mar 2022, IEEE Access, 10.1109/ACCESS.2022.3158958

[208] Carlton Shepherd, Konstantinos Markantonakis, Nico Van Heijningen, Driss Aboulkassimi, Clement Gaine, Thibaut Heckmann, David Naccache, "Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis", 17 Sep 2021, Computers and Security, 10.1016/j.cose.2021.102471

[207] Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd, Benjamin Semal, "A DLT-based Smart Contract Architecture for Atomic and Scalable Trading", 6 May 2021, https://arxiv.org/abs/2105.02937

[206] Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan, "LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices", May 2021, IEEE, 10.1109/SPW53761.2021.00036

[205] Vihangi Vagal, Konstantinos Markantonakis, Carlton Shepherd, "A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles", 14 Apr 2021, IEEE,

[204] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis, "Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns", 12 Feb 2021, IEEE Internet of Things Journal, 10.1109/JIOT.2021.3059047

[203] Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner, "One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud", 9 Feb 2021, 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), 10.1109/TrustCom50675.2020.00053

[202] Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Raja Naeem Akram, Benjamin Semal, "P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time", 25 Jan 2021, Energies, 10.3390/en14030606

[201] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner, "A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service", 14 Oct 2020, 2nd Workshop on Cloud Security and Privacy, 10.1007/978-3-030-61638-0_20

[200] George-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache, "Return-Oriented Programming on RISC-V", Oct 2020, ACM ASIACCS 2020, 10.1145/3320269.3384738

[199] Konstantinos Markantonakis, Marinella Petrocchi, "Security and Trust Management", 18 September 2020, 16th International Workshop, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020. Guildford, UK, September 17-18, 2020, Lecture Notes and Computer Science Proceedings, Pages: 148 pages, ISBN-10 : 3030598160,

[198] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner, "Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems", 14 Sep 2020, 35th International Conference on ICT Systems Security and Privacy Protection, 10.1007/978-3-030-58201-2_1

[197] Qiao HU, Bianxia DU, Konstantinos Markantonakis, Gerhard Hancke, "A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement", Jan 2020, IEEE Transactions on Industrial Informatics, 10.1109/TII.2019.2923662

[196] Dr. Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Christopher Watkins, "Location Tracking Using Smartphone Accelerometer and Magnetometer Traces", 26 Aug 2019, Association for Computing Machinery (ACM), 10.1145/3339252.3340518

[195] James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis, "An Evaluation of the Security of the Bitcoin Peer-To-Peer Network", 3 Jun 2019, The 2018 IEEE Conference on Blockchain , 10.1109/Cybermatics_2018.2018.00195

[194] Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis, "E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy", 3 Jun 2019, The 2018 IEEE Conference on Blockchain , 10.1109/Cybermatics_2018.2018.00262

[193] Thibaut Heckmann, James McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache, "Removing epoxy underfill between neighbouring components using acid for component chip-off", Jun 2019, digital investigation, 10.1016/j.diin.2019.04.003

[192] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis, "Remote Credential Management with Mutual Attestation for Trusted Execution Environments", 12 May 2019, Springer12th IFIP International Conference on Information Security Theory and Practice, 10.1007/978-3-030-20074-9_12

[191] Robert Lee, Konstantinos Markantonakis, Raja Naeem Akram, "Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices", 7 May 2019, ACM Transactions on Embedded Computing Systems, 10.1145/3284361

[190] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, "A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks", 10 Dec 2018, The 37th DASC Digital Avionics Systems Conference, 10.1109/DASC.2018.8569730

[189] Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis, "Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper", 7 Nov 2018, Springer-Verlag, https://www.springerprofessional.de/en/deep-learning-application-in-security-and-privacy-theory-and-pra/16718018

[188] Thibaut Heckmann, Konstantinos Markantonakis, David Naccache, Thomas Souvignet, "Forensic smartphone analysis using adhesives: Transplantation of Package on Package components", Sep 2018, digital investigation, 10.1016/j.diin.2018.05.005

[187] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette, "A Secure and Trusted Channel Protocol for UAVs Fleets", 21 Jun 2018, Springer-Verlag11th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP 2017, 10.1007/978-3-319-93524-9_1 Link to publication in Scopus

[186] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis, "EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs", 21 Jun 2018, Springer, 10.1007/978-3-319-93524-9_5

[185] Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, "Philanthropy on the Blockchain", 21 Jun 2018, Springer, 10.1007/978-3-319-93524-9_2

[184] Iakovos Gurulian, Gerhard Hancke, Konstantinos Markantonakis, Raja Naeem Akram, "May The Force Be With You: Force-Based Relay Attack Detection", 26 Jan 2018, 17th Smart Card Research and Advanced Application Conference, 10.1007/978-3-319-75208-2_9

[183] James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis, "Consumer Centric Data Control, Tracking and Transparency - A Position Paper", 2018, The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications: IEEE TrustCom-18, 10.1109/TrustCom/BigDataSE.2018.00191 https://arxiv.org/abs/1805.04747

[182] Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis, "Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance", 2018, The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications: IEEE TrustCom-18, 10.1109/TrustCom/BigDataSE.2018.00185 https://arxiv.org/abs/1805.05844

[181] Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram, "Good Vibrations: Artificial Ambience-Based Relay Attack Detection", 2018, The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications: IEEE TrustCom-18, 10.1109/TrustCom/BigDataSE.2018.00075

[180] Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Emmanouil Panaousis, "The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions", 21 Dec 2017, IEEEIEEE Mobile Security Technologies (MOST) 2017, 10.1109/SPW.2017.29

[179] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette, "Security, privacy and safety evaluation of dynamic and static fleets of drones", 9 Nov 2017, The 36th IEEE/AIAA Digital Avionics Systems Conference , 10.1109/DASC.2017.8101984

[178] Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette, "Serverless protocols for inventory and tracking with a UAV", 9 Nov 2017, IEEE Computer Society PressThe 36th IEEE/AIAA Digital Avionics Systems Conference , 10.1109/DASC.2017.8102113

[177] Iakovos Gurulian, Konstantinos Markantonakis, Raja Akram, Keith Mayes, "Artificial Ambient Environments for Proximity Critical Applications", 29 Aug 2017, ACM, 10.1145/3098954.3098964

[176] Carlton Shepherd, Raja Akram, Konstantinos Markantonakis, "Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments", 29 Aug 2017, ACM12th International Conference on Availability, Reliability and Security , 10.1145/3098954.3098971

[175] Robert Lee, Konstantinos Markantonakis, Raja Akram, "Provisioning Software with Hardware-Software Binding", 29 Aug 2017, ACM, 10.1145/3098954.3103158

[174] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "A Smart Card Web Server in the Web of Things", 23 Aug 2017, Springer, 10.1007/978-3-319-56991-8_55

[173] Carlton Shepherd, Fabien Petitcolas, Raja Naeem Akram, Konstantinos Markantonakis, "An Exploratory Analysis of the Security Risks of the Internet of Things in Finance", 27 Jul 2017, Springer-Verlag14th International Conference on Trust, Privacy & Security in Digital Business, 10.1007/978-3-319-64483-7_11

[172] Danushka Jayasinghe, Konstantinos Markantonakis, Raja Akram, Keith Mayes, "Enhancing EMV Tokenisation with Dynamic Transaction Tokens", 20 Jul 2017, Springer, 10.1007/978-3-319-62024-4_8

[171] Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis, "Tokenisation Blacklisting Using Linkable Group Signatures", 14 Jun 2017, 10.1007/978-3-319-59608-2_10

[170] Konstantinos Markantonakis, Raja Naeem Akram, "Multi-Application Smart Card Platforms and Operating Systems", 19 May 2017, Springer International Publishing, 10.1007/978-3-319-50500-8_3 https://doi.org/10.1007/978-3-319-50500-8_3

[169] Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, "Smart Card Reader and Mobile APIs", 19 May 2017, Springer International Publishing, 10.1007/978-3-319-50500-8_12 https://doi.org/10.1007/978-3-319-50500-8_12

[168] Iakovos Gurulian, Raja Akram, Konstantinos Markantonakis, Keith Mayes, "Preventing relay attacks in mobile transactions using infrared light", 3 Apr 2017, ACMThe 32nd ACM Symposium on Applied Computing, 10.1145/3019612.3019794

[167] Carlton Shepherd, Raja Akram, Konstantinos Markantonakis, "Towards trusted execution of multi-modal continuous authentication schemes", 3 Apr 2017, ACM, 10.1145/3019612.3019652

[166] Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Akram, "Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay", 2 Apr 2017, ACM3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), 10.1145/3055186.3055201

[165] Assad Umar, Raja Naeem Akram, Keith Mayes, Konstantinos Markantonakis, "Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road", 27 Mar 2017, IEEE3rd International Conference on Mobile and Secure Services (MobiSecServ), 10.1109/MOBISECSERV.2017.7886559

[164] Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Akram, Keith Mayes, "Extending EMV Tokenised Payments To Offline-Environments", 9 Feb 2017, IEEE Computer Society, 10.1109/TrustCom.2016.0095

[163] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Iakovos Gurulian, "Log Your Car: The Non-invasive Vehicle Forensics", 9 Feb 2017, IEEE Computer Society, 10.1109/TrustCom.2016.0164

[162] Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert Lee, Konstantinos Markantonakis, Raja Akram, Damien Sauveron, Emmanuel Conchon, "Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems", 9 Feb 2017, IEEE Computer Society, 10.1109/TrustCom.2016.0060

[161] Raja Akram, Pierre-Francois Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron, "Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements", 9 Feb 2017, IEEE Computer Society, 10.1109/TrustCom.2016.0116

[160] Md Hassan, Konstantinos Markantonakis, Raja Akram, "Can you call the software in your device firmware?", 9 Jan 2017, IEEE Computer Society PressThe 13th IEEE International Conference on e-Business Engineering (ICEBE 2016), 10.1109/ICEBE.2016.040

[159] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "Comparison of dynamic biometrie security characteristics against other biometrics", 2017, IEEE International Conference on Communications, 10.1109/ICC.2017.7996938

[158] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "Gesture recognition implemented on a personal limited device", 2017, International Conference on Information and Communication Systems, 10.1109/IACS.2017.7921966

[157] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Iakovos Gurulian, "Log Your Car: Reliable Maintenance Services Record", 2017, Springer12th International Conference on Information Security and Cryptology (Inscrypt), 10.1007/978-3-319-54705-3_30

[156] Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Eibe Frank, Raja Akram, Keith Mayes, "On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks", 2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10.1109/Trustcom/BigDataSE/ICESS.2017.218

[155] Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Akram, "Proximity Assurances Based on Natural and Artificial Ambient Environments", 2017, Springer10th International Conference on Security for Information Technology and Communications, 10.1007/978-3-319-69284-5

[154] Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette, "An efficient, secure and trusted channel protocol for avionics wireless networks", 12 Dec 2016, IEEE Computer Society, 10.1109/DASC.2016.7777967

[153] Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette, "Security and performance comparison of different secure channel protocols for Avionics Wireless Networks", 12 Dec 2016, IEEE Computer Society, 10.1109/DASC.2016.7777966

[152] Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes, "You can’t touch this: Consumer-centric android application repackaging detection", Dec 2016, Future Generation Computer Systems, 10.1016/j.future.2016.05.02110.1016/j.future.2017.11.011 http://www.sciencedirect.com/science/article/pii/S0167739X16301327

[151] Konstantinos Markantonakis, Raja Akram, "A secure and trusted boot process for Avionics Wireless Networks", 9 Jun 2016, IEEE Computer Society, 10.1109/ICNSURV.2016.7486322 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7486322

[150] Raja Akram, Konstantinos Markantonakis, "Challenges of security and trust of mobile devices as digital avionics component", 9 Jun 2016, IEEE Computer Society, 10.1109/ICNSURV.2016.7486323

[149] Robert Lee, Konstantinos Markantonakis, Raja Akram, "Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting", 30 May 2016, ACM Press, 10.1145/2899015.2899029

[148] Sarah Abu Ghazalah, Konstantinos Markantonakis, "Two Rounds RFID Grouping-Proof Protocol", 3 May 2016, The 2016 IEEE International Conference on RFID , 10.1109/RFID.2016.7488022 http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7488022

[147] Mehari Msgna, Houda Ferradi, Raja Akram, Konstantinos Markantonakis, "Secure Application Execution in Mobile Devices", 18 Mar 2016, Springer, 10.1007/978-3-662-49301-4_26

[146] Konstantinos Markantonakis, Raja Akram, Mehari Msgna, "Secure and Trusted Application Execution on Embedded Devices", 15 Jan 2016, Springer, 10.1007/978-3-319-27179-8_1

[145] Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Akram, Konstantinos Markantonakis, "A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags", 3 Dec 2015, IEEE Computer Society, 10.1109/Trustcom.2015.426

[144] Danushka Jayasinghe, Raja Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes, "Enhancing EMV Online PIN Verification", 3 Dec 2015, IEEE Computer Society, 10.1109/Trustcom.2015.451

[143] Raja Akram, Konstantinos Markantonakis, Damien Sauveron, "Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures", 3 Dec 2015, IEEE Computer Society, 10.1109/Trustcom.2015.410

[142] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks", 18 Nov 2015, Springer, 10.1007/978-3-319-24177-7_27

[141] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, "A Novel Consumer-Centric Card Management Architecture and Potential Security Issues", 10 Nov 2015, Journal of Information Science, 10.1016/j.ins.2014.12.049 http://www.sciencedirect.com/science/article/pii/S0020025514012018

[140] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, "Let’s Get Mobile: Secure FOTA for Automotive System", 6 Nov 2015, Springer, 10.1007/978-3-319-25645-0_38 http://link.springer.com/chapter/10.1007%2F978-3-319-25645-0_38

[139] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, "Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles", 19 Oct 2015, IEEE, 10.1109/ARES.2015.58

[138] Raja Akram, Konstantinos Markantonakis, Sharadha Kariyawasam, Shahid Ayub, Amar Seem, Robert Atkinson, "Challenges of security and trust in Avionics Wireless Networks", 13 Sep 2015, IEEE Computer Society, 10.1109/DASC.2015.7311416

[137] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "Authentication based on a changeable biometric using gesture recognition with the Kinect™", 2 Jul 2015, IEEE, 10.1109/ICB.2015.7139073 https://ieeexplore.ieee.org/document/7139073

[136] Assad Umar, Keith Mayes, Konstantinos Markantonakis, "Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element", 20 Feb 2015, IEEE, 10.1109/MOBISECSERV.2015.7072872 http://ieeexplore.ieee.org/document/7072872/

[135] Sheila Cobourne, Graham Hili, Keith Mayes, Konstantinos Markantonakis, "Practical Attacks on Virtual Worlds", 2015, Springer International Publishing, 10.1007/978-3-319-17127-2

[134] Danushka Jayasinghe, Konstantinos Markantonakis, Keith Mayes, "Optimistic Fair-Exchange with Anonymity for Bitcoin Users", 11 Dec 2014, IEEE Computer Society, 10.1109/ICEBE.2014.20

[133] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags", Dec 2014, International Journal of RFID Security and Cryprography (IJRFIDSC), 10.20533/ijrfidsc.2046.3715.2014.0018

[132] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR", 26 Sep 2014, IEEE Computer Society,

[131] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "Secure Improved Cloud-Based RFID Authentication Protocol", 10 Sep 2014, Springer,

[130] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, "Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager", 1 Sep 2014, IEEE Computer Society Press,

[129] Raja Naeem Akram, Konstantinos Markantonakis, "Rethinking the Smart Card Technology, Invited Paper", 1 Jun 2014, Springer,

[128] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains", 13 May 2014, IEEE Computer Society PressThe 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment,

[127] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, "Precise Instruction-Level Side Channel Profiling of Embedded Processors", 5 May 2014, 10.1007/978-3-319-06320-1_11 http://link.springer.com/chapter/10.1007/978-3-319-06320-1_11

[126] Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes, "Verifying Software Integrity in Embedded Systems: A Side Channel Approach", 13 Apr 2014, 10.1007/978-3-319-10175-0_18 http://link.springer.com/chapter/10.1007/978-3-319-10175-0_18

[125] Sheila Cobourne, Graham Hili, Keith Mayes, Konstantinos Markantonakis, "Avatar Voting in Virtual Worlds", Apr 2014, IEEE, 10.1109/IACS.2014.6841982

[124] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Trusted Platform Module for Smart Cards", 1 Mar 2014, IEEE Computer Society Press,

[123] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "An Introduction to Java Card Programming", 2014, Springer, 10.1007/978-1-4614-7915-4_22

[122] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "An Introduction to the Trusted Platform Module and Mobile Trusted Module", 2014, Springer, 10.1007/978-1-4614-7915-4_4

[121] Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes, "CAN Bus Risk Analysis Revisit", 2014, Springer, 10.1007/978-3-662-43826-8_13

[120] Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis, "Remote E-Voting Using the Smart Card Web Server", 2014, International Journal of Secure Software Engineering (IJSSE), 10.4018/ijsse.2014010103

[119] Keith Mayes, Konstantinos Markantonakis, "Secure Smart, Embedded Devices, Platforms and Applications", 2014, Springer,

[118] Graham Hili, Keith Mayes, Konstantinos Markantonakis, "The BIOS and Rootkits", 2014, Springer, 10.1007/978-1-4614-7915-4_16

[117] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA", 9 Dec 2013, IEEE Computer Society Press,

[116] Raja Naeem Akram, Konstantinos Markantonakis, "Smart Cards: State-of-the-Art to Future Directions, Invited Paper", 1 Dec 2013, IEEE Computer Science,

[115] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Recovering from Lost Digital Wallet", 1 Nov 2013,

[114] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Remote Attestation Mechanism based on Physical Unclonable Functions", 1 Nov 2013, IOS Press,

[113] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators", 1 Nov 2013, Springer,

[112] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, "The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems", 25 Sep 2013, 10.1007/978-3-319-04283-1_18 http://link.springer.com/chapter/10.1007/978-3-319-04283-1_18

[111] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram, "Subscriber Centric Conditional Access System for Pay-TV Systems", 11 Sep 2013, 10.1109/ICEBE.2013.70 http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6686303&tag=1

[110] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model", 16 Jul 2013, IEEE Computer Society Press,

[109] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes, "A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags", 8 Jul 2013, Springer-Verlag,

[108] Lazaros Kyrillidis, Boris Chazalet, Keith Mayes, Konstantinos Markantonakis, "Card-present Transactions On The Internet Using The Smart Card Web Server", 2013, IEEE Computer Society12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10.1109/TrustCom.2013.75 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6680893

[107] Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "Using the Smart Card Web Server in Secure Branchless Banking", 2013, Springer-Verlag, 10.1007/978-3-642-38631-2_19

[106] Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis, "Virtual World Authentication Using the Smart Card Web Server", 2013, Springer-VerlagInternational Symposium on Security in Computing and Communications, 10.1007/978-3-642-40576-1_4 http://link.springer.com/chapter/10.1007%2F978-3-642-40576-1_4

[105] S. Rho, D. Sauveron, K. Markantonakis (Eds.), "Special Issue on Advanced Semantic and Social Multimedia Technologies for Future Computing Environment Multimedia Tools and Applications", 1 Jan 2013, vol 64, No.2, 2013. Springer,

[104] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem", Nov 2012, IEEE Computer Society Press,

[103] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis, "Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones", Nov 2012, IOS PressThe 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia),

[102] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture", Oct 2012, Springer,

[101] Xuefei Leng, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis, "Tag Group Authentication using Bit Collisions", Oct 2012, IEEE,

[100] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "A Privacy Preserving Application Acquisition Protocol", 1 Jun 2012, IEEE Computer Society Press,

[99] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis", 1 May 2012,

[98] Keith Mayes, Lazaros Kyrillidis, Konstantinos Markantonakis, Song Dong, "A Brief Comparison of NFC Smart Posters and Quick Response Codes", 2012, NFC & ContactlessNFC World Congress, http://www.crisptelecom.com/files/nfcworld.pdf

[97] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis, "Distributed e-Voting using the Smart Card Web Server", 2012, IEEE7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), 10.1109/CRISIS.2012.6378952 http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6378952

[96] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Cross-Platform Application Sharing Mechanism", 1 Nov 2011, IEEE Computer Society Press,

[95] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "User Centric Security Model for Tamper-Resistant Devices", 1 Oct 2011, IEEE Computer Society Press,

[94] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Application-Binding Protocol in the User Centric Smart Card Ownership Model", 1 Jul 2011, Springer,

[93] Keith Mayes, Konstantinos Markantonakis, Zaheer Ahmad, Song Dong, "Considerations for Mobile Authentication in the Cloud", 2011, Information Security Technical Report,

[92] Keith Mayes, Sheila Cobourne, Konstantinos Markantonakis, "Near Field Technology in Challenging Environments", 2011, Smart Card Technology International,

[91] Damien Sauveron (Guest editor), Konstantinos Markantonakis (Guest editor), Keith Mayes (Guest editor), Christos Verikoukis (Guest editor), "Security and Resilience for Smart Devices and Applications", 2011, EURASIP Journal on Wireless Communications and Networking,

[90] L. Kyrillidis, K. Mayes, K. Markantonakis, "Smart card web server", 1 Jan 2011, Springer, 10.1007/978-94-007-1192-1_19 Link to publication in Scopus

[89] Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis, "Smart Card Web Server", 2011, Springer Netherland, 10.1007/978-94-007-1192-1_19 http://link.springer.com/chapter/10.1007/978-94-007-1192-1_19

[88] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis, "On the security issues of NFC enabled mobile phones", 1 Dec 2010, International Journal of Internet Technology and Secured Transactions, 10.1504/IJITST.2010.037408 http://dx.doi.org/10.1504/IJITST.2010.037408

[87] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Simulator Problem in User Centric Smart Card Ownership Model", 1 Dec 2010, IEEE Computer Society Press, 10.1109/EUC.2010.108

[86] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism", 1 Sep 2010, Springer, 10.1007/978-3-642-15257-3_15

[85] Lishoy Francis, Gerhard Hancke (Editor), Keith Mayes (Editor), Konstantinos Markantonakis (Editor), "A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions", 9 May 2010, 2010 Sixth Advanced International Conference on Telecommunications, http://doi.ieeecomputersociety.org/10.1109/AICT.2010.52 http://doi.ieeecomputersociety.org/10.1109/AICT.2010.52

[84] Gerhard Hancke, Konstantinos Markantonakis, Keith Mayes, "Security challenges for user-oriented RFID applications within the "Internet of things"", May 2010, Journal of Internet Technology,

[83] P. Samarati, M. Tunstall, J. Posegga, K. Markantonakis, D. Sauveron (Eds.), "Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices", 12 April 2010, Fourth IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Springer Lecture Notes in Computer Science Series, Vol. 6033, 2010, 386 p. ISBN: 978-3-642-12367-2.,

[82] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Firewall Mechanism in a User Centric Smart Card Ownership Model", 1 Apr 2010, Springer, 10.1007/978-3-642-12510-2

[81] Xuefei Leng, Yuan-Hung Lien, Keith Mayes, Konstantinos Markantonakis, "An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing", 1 Mar 2010, International Journal of Security and Networks, 10.1504/IJSN.2010.032206 http://dx.doi.org/10.1504/IJSN.2010.032206

[80] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "A Paradigm Shift in Smart Card Ownership Model", 1 Mar 2010, IEEE Computer Society Press, 10.1109/ICCSA.2010.52

[79] Lishoy Francis, Keith Mayes, Gerhard Hancke, Konstantinos Markantonakis, "A location based security framework for authenticating mobile phones", 2010, ACM, 10.1145/1890791.1890796 http://portal.acm.org/citation.cfm?doid=1890791.1890796

[78] Lishoy Francis, Keith Mayes, Kostas Markantonakis, Gerhard Hancke, "NFC Security Threats", Jan 2010, http://www.globalsmart.com

[77] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis, "Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones", 2010, Springer Berlin / HeidelbergRFIDSec 2010, http://eprint.iacr.org/2010/228.pdfhttp://dx.doi.org/10.1007/978-3-642-16822-2_4

[76] K. Mayes, K. Markantonakis, "Smart Cards, Tokens, Security and Applications", 2010, Springer, http://books.google.co.uk/books?id=FpCqcQAACAAJ

[75] Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis, "Web Server on a SIM Card", 2010, Newswood LimitedWorld Congress on Engineering, http://www.iaeng.org/publication/WCE2010/WCE2010_pp253-259.pdf

[74] Jonathan Hart, Konstantinos Markantonakis, Keith Mayes, "Website Credential Storage and Two-Factor Web Authentication with a Java SIM", 2010, Information security theory and practices: security and privacy of pervasive systems and smart devices, 10.1007/978-3-642-12368-9_17

[73] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Michael Tunstall Chapter in H. Bidgoli, Ed., "Handbook of Technology Management, vol. 2, Supply Chain Management, Marketing and Advertising, and Global Management", 1 Jan 2010, pp. 248-264, Wiley, 2010,

[72] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Location Based Application Availability", 1 Nov 2009, Springer, 10.1007/978-3-642-05290-3

[71] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, "Application Management Framework in User Centric Smart Card Ownership Model", 1 Aug 2009, Springer, 10.1007/978-3-642-10838-9_3

[70] Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, Keith Mayes, "Attacking smart card systems: Theory and practice", 1 May 2009, Information Security Technical Report, 10.1016/j.istr.2009.06.001 http://portal.acm.org/citation.cfm?id=1595066.1595100

[69] Keith E. Mayes, Konstantinos Markantonakis, Gerhard Hancke, "Transport ticketing security and fraud controls", 1 May 2009, Information Security Technical Report, 10.1016/j.istr.2009.06.003 http://www.sciencedirect.com/science/article/pii/S1363412709000193

[68] Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theo Tryfonas, John May, Apostolos Traganitis, "A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks", 2009, Springer Berlin / Heidelberg, http://dx.doi.org/10.1007/978-3-642-03819-8_11

[67] G. Poulopoulos, K. Markantonakis, K. Mayes, "A secure and efficient mutual authentication protocol for low-cost RFID systems", 1 Jan 2009, 10.1109/ARES.2009.83 Link to publication in Scopus

[66] G.P. Hancke, K.E. Mayes, K. Markantonakis, "Confidence in smart token proximity: Relay attacks revisited", 2009, Computers and Security, DOI: 10.1016/j.cose.2009.06.001 http://www.sciencedirect.com/science/article/pii/S0167404809000595

[65] Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis, "Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.", 2009,

[64] Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu, "Select Response Grouping Proof for RFID Tags", 2009, IEEE Computer Society Press, 10.1109/ACIIDS.2009.94 http://portal.acm.org/citation.cfm?id=1578014.1578047

[63] Michael Tunstall, Kostas Markantonakis, Damien Sauveron, Keith Mayes, "Smart Cards", 2009, John Wiley & Sons,

[62] Keith E. Mayes, Konstantinos Markantonakis, "Mobile communication security controllers an evaluation paper", 1 Aug 2008, Information Security Technical Report, 10.1016/j.istr.2008.09.004 http://portal.acm.org/citation.cfm?id=1460943.1461299

[61] J.A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, K. Markantonakis (Eds.), "Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks.", 13 May 2008, Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Springer Lecture Notes in Computer Science Series, Vol. 5019, 2008, 151 p. ISBN: 978-3-540-79965-8.,

[60] Xuefei Leng, Keith Mayes, Konstantinos Markantonakis, "HB-MP+ Protocol: An Improvement on the HB-MP Protocol", 1 Apr 2008, IEEE International Conference on RFID -- IEEE RFID 2008,

[59] Ioannis G. Askoxylakis, Damien Sauveron, Konstantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis, "A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks", 2008, IEEE Computer Society Press, 10.1109/SECURWARE.2008.42 http://portal.acm.org/citation.cfm?id=1447563.1447917

[58] Lishoy Francis, Keith Mayes, Konstantinos Markantonakis, "An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems", 2008, IEEE COMPUTER SOC,

[57] Wael William Malek, Keith Mayes, Kostas Markantonakis, "Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence", 2008, Springer-Verlag, http://dx.doi.org/10.1007/978-3-540-85893-5_9 http://dx.doi.org/10.1007/978-3-540-85893-5_9

[56] Jose A. Onieva (Editor), Sauveron D. (Editor), Chaumette S. (Editor), Gollmann D. (Editor), Konstantinos Markantonakis (Editor), "Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks", 2008,

[55] Jose A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, Konstantinos Markantonakis, "Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks", 2008,

[54] Keith Mayes, Kostas Markantonakis, Carlos Cid, "Mifare Classic Security Issues A System Perspective: Smart card Technology International, A Global Journal of Advanced Chip Technology", 2008, Smart Card Technology International,

[53] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Ioannis G. Askoxylakis, "Overview of Security Threats for Smart Cards in the Public Transport Industry", 2008, IEEE Computer Society Press, 10.1109/ICEBE.2008.91 http://portal.acm.org/citation.cfm?id=1471605.1472155

[52] D. Sauveron, K. Markantonakis, A. Bilas, A. J.-J. Quisquater (Eds.), "Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems", 9 May 2007, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007. Springer Lecture Notes in Computer Science Series, Vol. 4462, 2007, 255p. ISBN: 978-3-540-72353-0.,

[51] Keith Mayes, Kostas Markantonakis, "The Evolution of Mobile Security: The Silicon Trust Report", Feb 2007, The Silicon Trust,

[50] Keith Mayes, Kostas Markantonakis, "Will smart cards outsmart the criminals?", 29 Jan 2007, The Times Newspaper,

[49] Konstantinos Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, Fred Piper Chapter in N. Nedjah, Nedjah, A. Abraham, L. M. Mourelle, Eds., "Computational Intelligence in Information Assurance and Security, vol. 57 of Studies in Computational Intelligence", 2 Jan 2007, pp. 201-233, Springer-Verlag, 2007,

[48] Kevin Eagles, Konstantinos Markantonakis, Keith Mayes, "A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies", 2007, Springer-Verlag, http://portal.acm.org/citation.cfm?id=1763190.1763209

[47] Qing Zhang, Kostas Markantonakis, Keith Mayes, "A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins", 2007, Springer-VerlagThe 3rd International SKLOIS Conference on Information Security and Cryptology (Inscrypt),

[46] Konstantinos Markantonakis, Keith Mayes, "Problems and prospects of multi application smart cards in the UK financial industry", 2007, Icebe 2007: ieee international conference on e-Business engineering, proceedings,

[45] Kostas Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, "Smart Cards: Communication Protocols and Applications", 2007,

[44] Kostas Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron, "Smart card Security", 2007,

[43] Kostas Markantonakis, Fred Piper, Keith Mayes, "Smart Cards for Security and Assurance", 2007, Information Science Publishing,

[42] Damien Sauveron (Editor), Konstantinos Markantonakis (Editor), Angelos Bilas (Editor), Jean-Jacques Quisquater (Editor), "WISTP'07: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems", 2007,

[41] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Michael Tunstall Chapter in H. Bidgoli, Ed., "Handbook of Computer Networks", 1 Jan 2007, vol. 3, pp. 251-268, Wiley, 2007,

[40] William G. Sirett, Kostas Markantonakis, Keith Mayes, "Implementation of Temporally Aware Behaviour-Based Security in Smart Cards", Nov 2006, 1st International Workshop on Secure Information Systems (SIS '06),

[39] William G. Sirett, Konstantinos Markantonakis, Keith Mayes, "Temporally Aware Behaviour-Based Security in Smart Cards", 1 Nov 2006, 10.1109/ICCIAS.2006.294206

[38] Keith Mayes, Kostas Markantonakis, Calvin Chen, "Smart card Platform-Fingerprinting: Smart Card Technology International", Oct 2006, Smart Card Technology International,

[37] Kostas Markantonakis, Michael Tunstall, Keith Mayes, "Security of Open Satellite TV Receivers", Sep 2006, 7th Edition of e-smart conference and demos,

[36] Serge Chaumette, Kostas Markantonakis, Keith Mayes, Damien Sauveron, "The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos", Sep 2006, 7th Edition of e-smart conference and demos,

[35] Keith Mayes, Kostas Markantonakis, William G. Sirett, "A behavioural approach to smart card application monitoring: Smart Card Technology International, The Global Journal of Advanced Card Technology", Jan 2006, Smart Card Technology International,

[34] Q. Zhang, Kostas Markantonakis, K. Mayes, "A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol", 2006, E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on, http://doi.ieeecomputersociety.org/10.1109/CEC-EEE.2006.6

[33] Q. Zhang, Kostas Markantonakis, K. Mayes, "A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery", 2006, IEEE Computer Society Press, 10.1109/AICCSA.2006.205188 http://dl.acm.org/citation.cfm?id=1317529.1317666

[32] William G. Sirett, John A. MacDonald, Keith Mayes, Kostas Markantonakis, "Design, Installation and Execution of a Security Agent for Mobile Stations.", 2006, Springer, http://dblp.uni-trier.de/db/conf/cardis/cardis2006.html#SirettMMM06

[31] Michael Tunstall, Konstantinos Markantonakis, Keith Mayes, "Inhibiting Card Sharing Attacks", 2006, Springer Berlin / Heidelberg, http://dx.doi.org/10.1007/11908739_17

[30] Keith E. Mayes, Konstantinos Markantonakis, "On the potential of high density smart cards", 2006, Information Security Technical Report, DOI: 10.1016/j.istr.2006.05.002 http://www.sciencedirect.com/science/article/pii/S136341270600032X

[29] William G. Sirett, John A. Macdonald, Keith Mayes, Kostas Markantonakis, "Secure Deployment of Applications to Fielded Devices and Smart Cards", 2006,

[28] Damien Sauveron, Pierre Dusart, Armelle Trotin, Kostas Markantonakis, Keith Mayes, "Security Evaluation and Certification Process", 2006, Springer-Verlag,

[27] Kostas Markantonakis, Keith Mayes, Fred Piper, Michael Tunstall, "Smart card Security", 2006, Springer-Verlag,

[26] Q. Zhang, K. Mayes, Konstantinos Markantonakis, "A user-centric m-payment solution", 1 Nov 2005, 10.1109/MTAS.2005.207134

[25] Qing Zhang, Keith Mayes, Kostas Markantonakis, "A Fair Biometric Enabled M-Payment Solution with Anonymity Support", 2005, Springer-VerlagWorkshop on Information Security Applications,

[24] Lishoy Francis, William G. Sirett, Keith Mayes, Konstantinos Markantonakis, "Countermeasures for attacks on satellite TV cards using open receivers", 2005, Third Australasian Information Security Workshop, http://portal.acm.org/citation.cfm?id=1082290.1082311

[23] K. Papapanagiotou, Kostas Markantonakis, Q. Zhang, W. Sirett, K. Mayes, "On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation", 2005, Springer Boston, http://dx.doi.org/10.1007/0-387-25660-1_36

[22] Konstantinos Markantonakis, Keith Mayes, Piper Fred, "Smart card based authentication - any future?", 2005, Computers and Security,

[21] Kostas Markantonakis, Keith Mayes, "Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report", Feb 2004, The Silicon Trust,

[20] Konstantinos Rantos, Kostas Markantonakis, "An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.", 2004,

[19] Konstantinos Markantonakis, Keith Mayes, "A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY", 2004, Kluwer Academic Publishers,

[18] Keith Mayes, Mohammed Al Hussein, Kostas Markantonakis, "Increasing Awareness of Smart card System Security Issues: Smart Card Technology International Journal", 2004, Smart Card Technology International,

[17] Qing Zhang, Joao Nobrega Brites Moita, Keith Mayes, Kostas Markantonakis, "The Secure and Multiple Payment System based on the Mobile Phone Platform", 2004, Workshop on Information Security Applications,

[16] Keith Mayes, Kostas Markantonakis, "Smart Cards: Enabling e-Government: The Global Journal of Advanced Card Technology, Smart Card Technology International", Dec 2003,

[15] Konstantinos Markantonakis, Keith Mayes, "An overview of the GlobalPlatform smart card specification", 2003, Information Security Technical Report, DOI: 10.1016/S1363-4127(03)00103-1 http://www.sciencedirect.com/science/article/pii/S1363412703001031

[14] Keith Mayes, Konstantinos Markantonakis, "Are we smart about security?", 2003, Information Security Technical Report, DOI: 10.1016/S1363-4127(03)00102-X http://www.sciencedirect.com/science/article/pii/S136341270300102X

[13] Keith Mayes, Kostas Markantonakis, "The Smart Card Centre at Royal Holloway University of London: Secure - the Silicon Trust Report", 2003, The Silicon Trust,

[12] Konstantinos Markantonakis, "Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?", 2001, Kluwer, B.V.,

[11] Konstantinos Markantonakis, "Secure Log File Download Mechanisms for Smart Cards", 2000, Springer-Verlag, http://dl.acm.org/citation.cfm?id=646692.703447

[10] Konstantinos Markantonakis, Konstantinos Rantos, "On the Life Cycle of the Certification Authority key pairs in EMV'96", Apr 1999, Society for Computer SimulationEUROMEDIA 99,

[9] Konstantinos Markantonakis, "An Architecture for Audit Logging in a Smart Card Environment", Mar 1999, E-Commerce and New Media: Managing Safety, Security and Malware Challenges Effectively,

[8] Konstantinos Markantonakis, "Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards", 1999, Springer-Verlag,

[7] Konstantinos Markantonakis, Simeon Xenitellis, "Implementing a Secure Log File Download Manager for the Java Card", 1999, Kluwer, B.V.,

[6] Konstantinos Markantonakis, "Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)", 1 Jan 1999, Information Security Technical Report, http://dx.doi.org/10.1016/S1363-4127(99)80025-9 http://dx.doi.org/10.1016/S1363-4127(99)80025-9

[5] Konstantinos Markantonakis, "Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)", 1999, Elsevier,

[4] Konstantinos Markantonakis, "Java card technology and security", 1998, Information Security Technical Report,

[3] Konstantinos Markantonakis, "Secure Log File Download Mechanisms for Smart Cards.", 1998,

[2] Konstantinos Markantonakis, "The Case for a Secure Multi-Application Smart Card Operating System", 1998, Springer-Verlag, http://dl.acm.org/citation.cfm?id=648022.744180

[1] Damien Sauveron, Konstantinos Markantonakis, Angelos Bilas, Jean-Jacques Quisquater, "Information Security Theory and Practices, Smart cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6/WG 8.8/ WG 11.2, International Workshop in Information Security Theory and Practices (WISTP)", Lecture Notes in Computer Science (LNCS), Vol 4462, Pages 255, ISBN: 978-3-540-72353-0,

Trusted Execution Environments
Trusted Execution Environments

Carlton Shepherd, Konstantinos Markantonakis

Secure Smart Embedded Devices, Platforms and Applications
Secure Smart Embedded Devices, Platforms and Applications

Konstantinos Markantonakis, Keith Mayes

ISBN: 978-1-4614-7914-7 (Print) 978-1-4614-7915-4 (Online)

Smart Cards, Tokens, Security and Applications
Smart Cards, Tokens, Security and Applications

Keith E. Mayes, Konstantinos Markantonakis (eds.)

ISBN: 978-0-387-72197-2 (Print) 978-0-387-72198-9 (Online) Publisher: Springer US, 2008 DOI: 10.1007/978-0-387-72198-9

Smart Cards, Tokens, Security and Applications
Smart Cards, Tokens, Security and Applications

Keith Mayes, Konstantinos Markantonakis

Springer International Publishing Hardcover ISBN:978-3-319-50498-8 DOI: 10.1007/978-3-319-50500-8