All Publications

PUBLICATION OUTPUTS

My Google Scholar profile can be obtained from here.

Book

Conference contribution

2017

CC105🔗Mtita, C, Laurent, M, Sauveron, D , Akram, RN , Markantonakis, K & Chaumette, S 2017, Serverless Protocols for Inventory and Tracking with a UAV. in Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. IEEE Computer Society Press, St. Petersburg, Florida, USA, pp. 1-11, The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17-21 September. DOI: 10.1109/DASC.2017.8102113

CC104🔗Gurulian, I , Markantonakis, K , Shepherd, C, Frank, E & Akram, R 2017, Proximity Assurances Based on Natural and Artificial Ambient Environments. in 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Security and Cryptology, vol. 10543, Springer, 10th International Conference on Security for Information Technology and Communications, Bucharest, Romania, 8 July. DOI: 10.1007/978-3-319-69284-5

CC103🔗Shepherd, C , Akram, RN & Markantonakis, K 2017, EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. in 11th IFIP International Conference on Information Security Theory and Practice (WISTP’17). Springer.

CC102🔗Gurulian, I , Shepherd, C , Markantonakis, K, Frank, E , Akram, R & Mayes, K 2017, On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. in Trustcom/BigDataSE/ICESS, 2017 IEEE. 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Sydney, Australia, 1-4 August. DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.218

CC101🔗Gurulian, I , Markantonakis, K , Akram, R & Mayes, K 2017, Artificial Ambient Environments for Proximity Critical Applications. in ARES ’17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM. DOI: 10.1145/3098954.3098964

CC100🔗Shepherd, C , Akram, R & Markantonakis, K 2017, Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. in 12th International Conference on Availability, Reliability and Security (ARES ’17). ACM, pp. 1-10, 12th International Conference on Availability, Reliability and Security , Reggio Calabria, Italy, 29-31 August. DOI: 10.1145/3098954.3098971

CC99🔗Lee, R , Markantonakis, K & Akram, R 2017, Provisioning Software with Hardware-Software Binding. in FARES ’17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM. DOI: 10.1145/3098954.3103158

CC98🔗Kyrillidis, L , Cobourne, S , Mayes, K & Markantonakis, K 2017, A Smart Card Web Server in the Web of Things. in SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Lecture Notes in Networks and Systems , vol. 16, Springer, pp. 769-784. DOI: 10.1007/978-3-319-56991-8_55

CC97🔗Shepherd, C, Petitcolas, F , Akram, R & Markantonakis, K 2017, An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. in J Lopez, S Fischer-Hübner & C Lambrinoudakis (eds), Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10442, Springer-Verlag, pp. 164-179, 14th International Conference on Trust, Privacy & Security in Digital Business, Lyon, France, 28-31 August. DOI: 10.1007/978-3-319-64483-7_11

CC96🔗Jayasinghe, D , Markantonakis, K , Akram, R & Mayes, K 2017, Enhancing EMV Tokenisation with Dynamic Transaction Tokens. in G Hancke & K Markantonakis (eds), Radio Frequency Identification and IoT Security: RFIDSec 2016. Lecture Notes in Computer Science , vol. 10155, Springer, pp. 107-122. DOI: 10.1007/978-3-319-62024-4_8

CC95🔗Umar, A , Gurulian, I , Mayes, K & Markantonakis, K 2017, Tokenisation Blacklisting using Linkable Group Signatures. in Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. DOI: 10.1007/978-3-319-59608-2_10

CC94🔗Shepherd, C , Akram, R & Markantonakis, K 2017, Towards Trusted Execution of Multi-modal Continuous Authentication Schemes. in Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC ’17). ACM, Marrakech, Morocco, pp. 1444-1451. DOI: 10.1145/3019612.3019652

CC93🔗Haken, G , Markantonakis, K , Gurulian, I , Shepherd, C & Akram, R 2017, Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. in Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS ’17. ACM, New York, pp. 21-32 , 3rd ACM Cyber-Physical System Security Workshop (CPSS 2017), Abu Dhabi, United Arab Emirates, 2-2 April. DOI: 10.1145/3055186.3055201

CC92🔗Umar, A , Akram, RN , Mayes, K & Markantonakis, K 2017, Ecosystems of Trusted Execution Environment on Smartphones – A Potentially Bumpy Road. in P Urien & S Piramuthu (eds), Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. IEEE, 3rd International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, 11-12 February. DOI: 10.1109/MOBISECSERV.2017.7886559

CC91🔗Jayasinghe, D , Cobourne, S , Markantonakis, K , Akram, RN & Mayes, K 2017, Philanthropy On The Blockchain. in The 11th WISTP International Conference on Information Security Theory and Practice (WISTP’2017). Lecture Notes in Computer Science (LNCS), Springer.

CC90🔗Gurulian, I , Akram, R , Markantonakis, K & Mayes, K 2017, Preventing Relay Attacks in Mobile Transactions Using Infrared Light. in SAC ’17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, pp. 1724-1731, The 32nd ACM Symposium on Applied Computing, Marrakesh, Morocco, 3-6 April. DOI: 10.1145/3019612.3019794

CC89🔗Shepherd, C , Gurulian, I, Frank, E , Markantonakis, K , Akram, R , Mayes, K & Panaousis, E 2017, The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. in Mobile Security Technologies (MoST ’17), IEEE Security & Privacy Workshops. IEEE, IEEE Mobile Security Technologies (MOST) 2017, San Jose, United States, 25-25 May.

CC88🔗Jayasinghe, D , Markantonakis, K , Gurulian, I , Akram, R & Mayes, K 2017, Extending EMV Tokenised Payments To Offline-Environments. in The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 1-8. DOI: 10.1109/TrustCom.2016.0095

CC87🔗Mansor, H , Markantonakis, K , Akram, R , Mayes, K & Gurulian, I 2017, Log your car: The non-invasive vehicle forensics. in Y Xiang, K Ren & D Feng (eds), he 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)., TrustCom Paper 147, IEEE Computer Society, pp. 1-9. DOI: 10.1109/TrustCom.2016.0164

CC86🔗Shepherd, C, Arfaoui, G , Gurulian, I , Lee, R , Markantonakis, K , Akram, R, Sauveron, D & Conchon, E 2017, Secure and Trusted Execution: Past, Present and Future — A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. in Y Xiang, K Ren & D Feng (eds), The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). ., TrustCom Paper 342, IEEE Computer Society, pp. 1-10. DOI: 10.1109/TrustCom.2016.0060

CC85🔗Akram, R, Bonnefoi, P-F, Chaumette, S , Markantonakis, K & Sauveron, D 2017, Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. in Y Xiang, K Ren & D Feng (eds), the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16)., TrustCom Paper 297, IEEE Computer Society. DOI: 10.1109/TrustCom.2016.0116

CC84🔗Hassan, M , Markantonakis, K & Akram, R 2017, Can you call the software in your device firmware? in e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. IEEE Computer Society Press, Macau, China, pp. 1-8, The 13th IEEE International Conference on e-Business Engineering (ICEBE 2016), Macau, China, 4-6 November. DOI: 10.1109/ICEBE.2016.040

CC83🔗Mansor, H , Markantonakis, K , Akram, R , Mayes, K & Gurulian, I 2017, Log Your Car: Reliable Maintenance Services Record. in Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. vol. 10143, Lecture Notes in Computer Science , vol. 10143, Springer, pp. 484-504, 12th International Conference on Information Security and Cryptology (Inscrypt), Beijing, China, 4-6 November. DOI: 10.1007/978-3-319-54705-3_30
2016

CC82🔗Akram, R , Markantonakis, K , Mayes, K, Bonnefoi, P-F, Sauveron, D & Chaumette, S 2016, An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. in A Roy & W Schuster (eds), 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (IEEE DASC 2016)., 1570260400, IEEE Computer Society.

CC81🔗Akram, R , Markantonakis, K , Mayes, K, Bonnefoi, P-F, Sauveron, D & Chaumette, S 2016, Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks. in A Roy & W Schuster (eds), 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC)., 1570260399, IEEE Computer Society.

CC80🔗Akram, R & Markantonakis, K 2016, Challenges of Security and Trust of Mobile Devices as Digital Avionics Component. in Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, pp. 1C4-1-1C4-11. DOI: 10.1109/ICNSURV.2016.7486323

CC79🔗Lee, R , Markantonakis, K & Akram, R 2016, Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting. in CPSS ’16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, ACM Press, pp. 70-81. DOI: 10.1145/2899015.2899029

CC78🔗Markantonakis, K & Akram, R 2016, A Secure and Trusted Boot Process for Avionics Wireless Networks. in 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, pp. 1C3-1-1C3-9. DOI: 10.1109/ICNSURV.2016.7486322
2015

CC77🔗Mansor, H , Markantonakis, K , Akram, R & Mayes, K 2015, Let’s Get Mobile: Secure FOTA for Automotive System. in Network and System Security. vol. 9408, Lecture Notes in Computer Science, vol. 9408, Springer, pp. 503-510. DOI: 10.1007/978-3-319-25645-0_38

CC76🔗Akram, R & Markantonakis, K 2015, Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. in PYA Ryan & E Weippl (eds), 20th European Symposium on Research in Computer Security (ESORICS 2015). Springer, Vienna, Austria.

CC75🔗Akram, R , Markantonakis, K, Kariyawasam, S, Ayub, S, Seem, A & Atkinson, R 2015, Challenges of security and trust in Avionics Wireless Networks. in 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, pp. 4B1-1-4B1-12. DOI: 10.1109/DASC.2015.7311416

CC74🔗Bonnefoi, P-F, Dusart, P, Sauveron, D , Akram, R & Markantonakis, K 2015, A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-cost RFID Tags. in The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society.

CC73🔗Jayasinghe, D , Akram, R , Markantonakis, K, Rantos, K & Mayes, K 2015, Enhancing EMV Online PIN Verification. in The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). IEEE Computer Society, Helsinki, Finland, pp. 1-10. DOI: 10.1109/Trustcom.2015.451

CC72🔗Akram, R , Markantonakis, K & Sauveron, D 2015, Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures. in Z Yan & P Mueller (eds), The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, Helsinki, Finland.

CC71🔗Markantonakis, K , Akram, R & Msgna, M 2015, Secure and Trusted Application Execution on Embedded Devices. in D Naccache & E Simion (eds), 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Springer.

CC69🔗Mansor, H , Markantonakis, K , Akram, R & Mayes, K 2015, Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. in 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, pp. 139-148. DOI: 10.1109/ARES.2015.58

CC68🔗Cobourne, S , Hili, G , Mayes, K & Markantonakis, K 2015, Practical Attacks on Virtual Worlds. in J Lopez, I Ray & B Crispo (eds), Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. 1 edn, vol. 8924, Lecture Notes in Computer Science, Springer International Publishing, pp. 180-195. DOI: 10.1007/978-3-319-17127-2
2014

CC67🔗Jayasinghe, D , Markantonakis, K & Mayes, K 2014, Optimistic Fair-Exchange with Anonymity for Bitcoin Users. in The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). IEEE Computer Society, Guangzhou, China, pp. 44-51. DOI: 10.1109/ICEBE.2014.20

CC66🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2014, Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. in The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society.

CC65🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2014, Secure Improved Cloud-Based RFID Authentication Protocol. in The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer.

CC64🔗Akram, RN , Markantonakis, K & Sauveron, D 2014, Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. in Y Liu (ed.), The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society Press.

CC63🔗Akram, RN & Markantonakis, K 2014, Rethinking the Smart Card Technology, Invited Paper. in T Tryfonas & I Askoxylakis (eds), 16th International Conference on Human-Computer Interaction. Springer.

CC62🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2014, Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. in The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, pp. 871- 878, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment, Victoria, Canada, 13-16 May.

CC61🔗Msgna, M , Markantonakis, K & Mayes, K 2014, Precise Instruction-Level Side Channel Profiling of Embedded Processors. in Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. vol. 8434, Lecture Notes in Computer Science, pp. 129-143. DOI: 10.1007/978-3-319-06320-1_11

CC60🔗Msgna, M , Markantonakis, K, Naccache, D & Mayes, K 2014, Verifying Software Integrity in Embedded Systems: A Side Channel Approach. in Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Lecture Notes in Computer Science, Paris, France, pp. 261-280. DOI: 10.1007/978-3-319-10175-0_18

CC59🔗Cobourne, S , Hili, G , Mayes, K & Markantonakis, K 2014, Avatar Voting in Virtual Worlds. in 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, pp. 1 – 6 . DOI: 10.1109/IACS.2014.6841982

CC58🔗Akram, RN , Markantonakis, K & Mayes, K 2014, Trusted Platform Module for Smart Cards. in O Alfandi (ed.), 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE Computer Society Press, Dubai, UAE.
2013

CC57🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2013, A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA. in The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). IEEE Computer Society Press, London, pp. 44-51.

CC56🔗Akram, RN & Markantonakis, K 2013, Smart Cards: State-of-the-Art to Future Directions, Invited Paper. in C Douligeris & D Serpanos (eds), IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). IEEE Computer Science, Athens, Greece.

CC55🔗Akram, RN , Markantonakis, K & Mayes, K 2013, Recovering from Lost Digital Wallet. in FGM Y. Xiang & S Ruj (eds), The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13).

CC54🔗Akram, RN , Markantonakis, K & Mayes, K 2013, Remote Attestation Mechanism based on Physical Unclonable Functions. in CM J. Zhou & J Weng (eds), The 2013 Workshop on RFID and IoT Security (RFIDsec’13 Asia). IOS Press, Guangzhou, China.

CC53🔗Akram, RN , Markantonakis, K & Mayes, K 2013, Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators. in S Qing & J Zhou (eds), 5th International Conference on Information and Communications Security (ICICS 2013). Springer, Beijing, China.

CC52🔗Msgna, M , Markantonakis, K & Mayes, K 2013, The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. in Security and Privacy in Communication Networks: 9th International ICST Conference. vol. 127, Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering, vol. 127, Sydney, Australia, pp. 288-304. DOI: 10.1007/978-3-319-04283-1_18

CC51🔗Msgna, M , Markantonakis, K , Mayes, K & Akram, RN 2013, Subscriber Centric Conditional Access System for Pay-TV Systems. in IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. pp. 459-455. DOI: 10.1109/ICEBE.2013.70

CC50🔗Akram, RN , Markantonakis, K & Mayes, K 2013, A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model. in 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). IEEE Computer Society Press, Melbourne, Australia.

CC49🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2013, A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. in The 25th IFIP International Information Security Conference (SEC 2013). vol. 405, Springer-Verlag, pp. 102-110.

CC48🔗Kyrillidis, L, Chazalet, B , Mayes, K & Markantonakis, K 2013, Card-present Transactions On The Internet Using The Smart Card Web Server. in Proceedings of TrustCom 2013. IEEE Computer Society, pp. 611-619, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16-18 July. DOI: 10.1109/TrustCom.2013.75

CC47🔗Cobourne, S , Mayes, K & Markantonakis, K 2013, Using the Smart Card Web Server in Secure Branchless Banking. in J Lopez, X Huang & R Sandhu (eds), Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. vol. 7873, Lecture Notes In Computer Science, Springer-Verlag, pp. 250-263. DOI: 10.1007/978-3-642-38631-2_19

CC46🔗Kyrillidis, L , Hili, G , Cobourne, S , Mayes, K & Markantonakis, K 2013, Virtual World Authentication Using the Smart Card Web Server. in S Thampi, P Atrey, C-I Fan & G Martinez Perez (eds), Security in Computing and Communications. Communications in Computer and Information Science, vol. 377, Springer-Verlag, pp. 30-41, International Symposium on Security in Computing and Communications, Mysore, India, 22-24 August. DOI: 10.1007/978-3-642-40576-1_4
2012

CC45🔗Akram, RN , Markantonakis, K & Mayes, K 2012, Building the Bridges — A Proposal for Merging different Paradigms in Mobile NFC Ecosystem. in S Xie (ed.), The 8th International Conference on Computational Intelligence and Security (CIS 2012). IEEE Computer Society Press.

CC44🔗Francis, L , Hancke, G , Mayes, K & Markantonakis, K 2012, Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. in N-W Lo & Y Li (eds), The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). vol. 8, Cryptology and Information Security Series, vol. 8, IOS Press, pp. 21 – 32, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), Taipei, Taiwan, Province of China, 8-9 November.

CC43🔗Akram, RN , Markantonakis, K & Mayes, K 2012, Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture. in KP Chow & LCK Hui (eds), The 2012 International Conference on Information and Communications Security (ICICS 2012). LNCS, Springer.

CC42🔗Leng, X , Hancke, G , Mayes, K & Markantonakis, K 2012, Tag Group Authentication using Bit Collisions. in Information Security South Africa (ISSA). IEEE.

CC41🔗Akram, RN , Markantonakis, K & Mayes, K 2012, A Privacy Preserving Application Acquisition Protocol. in FGM Geyong Min (ed.), 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE Computer Society Press, Liverpool, United Kingdom.

CC40🔗Akram, RN , Markantonakis, K & Mayes, K 2012, Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. in A Mana & M Klonowski (eds), 5th International Conference on New Technologies, Mobility and Security (NTMS).

CC39🔗Kyrillidis, L , Cobourne, S , Mayes, K, Dong, S & Markantonakis, K 2012, Distributed e-Voting using the Smart Card Web Server. in F Martinelli, J-L Lanet, W Fitzgerald & S Foley (eds), Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). IEEE, 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012), Cork, Ireland, 10-12 October. DOI: 10.1109/CRISIS.2012.6378952
2011

CC38🔗Akram, RN , Markantonakis, K & Mayes, K 2011, Cross-Platform Application Sharing Mechanism. in H Wang, SR Tate & Y Xiang (eds), 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). IEEE Computer Society Press, Changsha, China.

CC37🔗Akram, RN , Markantonakis, K & Mayes, K 2011, User Centric Security Model for Tamper-Resistant Devices. in J Li & J-Y Chung (eds), 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). IEEE Computer Society Press.

CC36🔗Akram, RN , Markantonakis, K & Mayes, K 2011, Application-Binding Protocol in the User Centric Smart Card Ownership Model. in U Parampalli & P Hawkes (eds), the 16th Australasian Conference on Information Security and Privacy (ACISP). LNCS, Springer, Melbourne, Australia, pp. 208-225.
2010

CC35🔗Akram, RN , Markantonakis, K & Mayes, K 2010, Simulator Problem in User Centric Smart Card Ownership Model. in HY Tang & X Fu (eds), 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). IEEE Computer Society Press, HongKong, China. DOI: 10.1109/EUC.2010.108

CC34🔗Akram, RN , Markantonakis, K & Mayes, K 2010, A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. in K Rannenberg & V Varadharajan (eds), 25th IFIP International Information Security Conference (SEC 2010). IFIP AICT Series, Springer, Brisbane, Australia, pp. 161-171. DOI: 10.1007/978-3-642-15257-3_15

CC33🔗Akram, RN , Markantonakis, K & Mayes, K 2010, Firewall Mechanism in a User Centric Smart Card Ownership Model. in D Gollmann, J-L Lanet & J Iguchi-Cartigny (eds), Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. vol. 6035/2010, LNCS, Springer, Passau, Germany, pp. 118-132. DOI: 10.1007/978-3-642-12510-2

CC32🔗Akram, RN , Markantonakis, K & Mayes, K 2010, A Paradigm Shift in Smart Card Ownership Model. in BO Apduhan, O Gervasi, A Iglesias, D Taniar & M Gavrilova (eds), Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). IEEE Computer Society Press, Fukuoka, Japan, pp. 191-200. DOI: 10.1109/ICCSA.2010.52

CC31🔗Francis, L , Mayes, K , Markantonakis, K & Hancke, G 2010, NFC Security Threats. in T Courtney (ed.), Near Field Communications: Smart Card Technology International. pp. 42-47.

CC30🔗Francis, L , Mayes, K , Hancke, G & Markantonakis, K 2010, A location based security framework for authenticating mobile phones. in M-PAC ’10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. ACM, New York, NY, pp. 5:1-5:8. DOI: 10.1145/1890791.1890796

CC29🔗Francis, L , Hancke, G , Mayes, K & Markantonakis, K 2010, Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. in S Ors Yalcin (ed.), Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. vol. 6370, Lecture Notes in Computer Science, vol. 6370, Springer Berlin / Heidelberg, pp. 35-49, RFIDSec 2010, Istanbul, Turkey, 8-9 June.

CC28🔗Kyrillidis, L , Mayes, K & Markantonakis, K 2010, Web Server on a SIM Card. in SI Ao, L Gelman, DWL Hukins, A Hunter & AM Korsunsky (eds), Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. vol. I, Newswood Limited, pp. 253-259, World Congress on Engineering, London, United Kingdom, 30-2 July.
2009

CC27🔗Akram, RN , Markantonakis, K & Mayes, K 2009, Location Based Application Availability. in R Meersman, P Herrero & T Dillon (eds), On the Move to Meaningful Internet Systems: OTM 2009 Workshops. vol. 5872/2009, LNCS, Springer, Vilamoura, Portugal, pp. 128 – 138. DOI: 10.1007/978-3-642-05290-3

CC26🔗Akram, RN , Markantonakis, K & Mayes, K 2009, Application Management Framework in User Centric Smart Card Ownership Model. in HY YOUM & M Yung (eds), The 10th International Workshop on Information Security Applications (WISA09). vol. 5932/2009, LNCS, Springer, Busan, Korea, pp. 20-35. DOI: 10.1007/978-3-642-10838-9_3

CC25🔗Poulopoulos, G , Markantonakis, K & Mayes, K 2009, A secure and efficient mutual authentication protocol for low-cost RFID systems. in Proceedings – International Conference on Availability, Reliability and Security, ARES 2009. pp. 706-711. DOI: 10.1109/ARES.2009.83

CC23🔗Leng, X, Lien, Y , Mayes, K , Markantonakis, K & Chiu, J-H 2009, Select Response Grouping Proof for RFID Tags. in Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. IEEE Computer Society Press, Washington, DC, USA, pp. 73-77. DOI: 10.1109/ACIIDS.2009.94
2008

CC22🔗Askoxylakis, IG, Sauveron, D , Markantonakis, K, Tryfonas, T & Traganitis, A 2008, A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. in Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. IEEE Computer Society Press, Washington, DC, USA, pp. 193-202. DOI: 10.1109/SECURWARE.2008.42

CC21🔗Francis, L , Mayes, K & Markantonakis, K 2008, An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems. in THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. IEEE COMPUTER SOC, LOS ALAMITOS, pp. 386-395.

CC20🔗Malek, WW , Mayes, K & Markantonakis, K 2008, Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. in Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. CARDIS ’08, Springer-Verlag, Berlin, Heidelberg, pp. 118-132. DOI: http://dx.doi.org/10.1007/978-3-540-85893-5_9

CC19🔗Markantonakis, K , Mayes, K, Sauveron, D & Askoxylakis, IG 2008, Overview of Security Threats for Smart Cards in the Public Transport Industry. in Proceedings of the 2008 IEEE International Conference on e-Business Engineering. IEEE Computer Society Press, Washington, DC, USA, pp. 506-513. DOI: 10.1109/ICEBE.2008.91
2007

CC18🔗Eagles, K , Markantonakis, K & Mayes, K 2007, A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies. in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. WISTP’07, Springer-Verlag, Berlin, Heidelberg, pp. 161-174.

CC17🔗Zhang, Q , Markantonakis, K & Mayes, K 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. in A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. Springer-Verlag, China, The 3rd International SKLOIS Conference on Information Security and Cryptology (Inscrypt), Xining, China, 1 September.
2006

CC16🔗Sirett, WG , Markantonakis, K & Mayes, K 2006, Temporally Aware Behaviour-Based Security in Smart Cards. in Computational Intelligence and Security, 2006 International Conference on. vol. 1, pp. 604 -608. DOI: 10.1109/ICCIAS.2006.294206

CC15🔗Zhang, Q , Markantonakis, K & Mayes, K 2006, A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery. in Proceedings of the IEEE International Conference on Computer Systems and Applications. IEEE Computer Society Press, Washington, DC, USA, pp. 851-858. DOI: 10.1109/AICCSA.2006.205188

CC14🔗Sirett, WG , MacDonald, JA , Mayes, K & Markantonakis, K 2006, Design, Installation and Execution of a Security Agent for Mobile Stations. in J Domingo-Ferrer, J Posegga & D Schreckling (eds), CARDIS. vol. 3928, Lecture Notes in Computer Science, Springer, pp. 1-15.

CC13🔗Tunstall, M , Markantonakis, K & Mayes, K 2006, Inhibiting Card Sharing Attacks. in H Yoshiura, K Sakurai, K Rannenberg, Y Murayama & S Kawamura (eds), Advances in Information and Computer Security. vol. 4266, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, pp. 239-251.

2005

CC11🔗Zhang, Q , Mayes, K & Markantonakis, K 2005, A user-centric m-payment solution. in Mobile Technology, Applications and Systems, 2005 2nd International Conference on. pp. 8. DOI: 10.1109/MTAS.2005.207134

CC10🔗Zhang, Q , Mayes, K & Markantonakis, K 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. in A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag, Workshop on Information Security Applications, Jeju, Korea, Republic of, 1 August.

CC9🔗Papapanagiotou, K , Markantonakis, K, Zhang, Q, Sirett, W & Mayes, K 2005, On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. in R Sasaki, S Qing, E Okamoto & H Yoshiura (eds), Security and Privacy in the Age of Ubiquitous Computing. vol. 181, IFIP Advances in Information and Communication Technology, Springer Boston, pp. 551-563.
2004

CC8🔗Markantonakis, K & Mayes, K 2004, A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY. in Eight IFIP TC-6-11 Conference on Communications and Multimedia Security. Kluwer Academic Publishers.

CC6🔗Zhang, Q, Brites Moita, JN , Mayes, K & Markantonakis, K 2004, The Secure and Multiple Payment System based on the Mobile Phone Platform. in The Secure and Multiple Payment System based on the Mobile Phone Platform. Workshop on Information Security Applications, Jeju, Korea, Republic of, 1 August.
2000

CC5🔗Markantonakis, K 2000, Secure Log File Download Mechanisms for Smart Cards. in Proceedings of the The International Conference on Smart Card Research and Applications. Springer-Verlag, London, UK, pp. 285-304.
1999

CC4🔗Markantonakis, K & Rantos, K 1999, On the Life Cycle of the Certification Authority key pairs in EMV’96. in On the Life Cycle of the Certification Authority key pairs in EMV’96. Society for Computer Simulation, pp. 125-130, EUROMEDIA 99, Munich, Germany, 25-28 April.

CC3🔗Markantonakis, K 1999, An Architecture for Audit Logging in a Smart Card Environment. in An Architecture for Audit Logging in a Smart Card Environment. E-Commerce and New Media: Managing Safety, Security and Malware Challenges Effectively, AALBORG, Denmark, 27-2 March.
1998

CC1🔗Markantonakis, K 1998, The Case for a Secure Multi-Application Smart Card Operating System. in Proceedings of the First International Workshop on Information Security. ISW ’97, Springer-Verlag, London, UK, pp. 188-197.

Chapter

2017

CH20🔗Markantonakis, K & Akram, RN 2017, Multi-Application Smart Card Platforms and Operating Systems. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 59-92. DOI: 10.1007/978-3-319-50500-8_3

CH19🔗Sauveron, D , Akram, RN & Markantonakis, K 2017, Smart Card Reader and Mobile APIs. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 305-349. DOI: 10.1007/978-3-319-50500-8_12
2016

CH18🔗Msgna, M, Ferradi, H , Akram, R & Markantonakis, K 2016, Secure Application Execution in Mobile Devices. in PA Ryan, D Naccache & J-J Quisquater (eds), The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer, pp. 417-438.
2015

CH17🔗Ducray, B , Cobourne, S , Mayes, K & Markantonakis, K 2015, Authentication Based on a Changeable Biometric using Gesture Recognition with the Kinect. in The 8th IAPR International Conference on Biometrics (ICB) 2015. IEEE, Phuket , pp. 38 – 45 . DOI: 10.1109/ICB.2015.7139073
2014

CH16🔗Akram, RN , Markantonakis, K & Mayes, K 2014, An Introduction to Java Card Programming. in Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 497-513. DOI: 10.1007/978-1-4614-7915-4_22

CH15🔗Akram, RN , Markantonakis, K & Mayes, K 2014, An Introduction to the Trusted Platform Module and Mobile Trusted Module. in K Markantonakis & K Mayes (eds), Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 71-93. DOI: 10.1007/978-1-4614-7915-4_4

CH14🔗Hili, G , Mayes, K & Markantonakis, K 2014, The BIOS and Rootkits. in Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 369-381.
2011

CH13🔗Kyrillidis, L , Mayes, K & Markantonakis, K 2011, Smart card web server. in S-I Ao & L Gelman (eds), Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, vol. 90, Springer, pp. 221-232. DOI: 10.1007/978-94-007-1192-1_19

CH12🔗Kyrillidis, L , Mayes, K & Markantonakis, K 2011, Smart Card Web Server. in S Ao & L Gelman (eds), Electrical Engineering and Applied Computing. vol. 90, Lecture Notes in Electrical Engineering, Springer Netherland, pp. 221-232. DOI: 10.1007/978-94-007-1192-1_19
2009

CH11🔗Tunstall, M , Markantonakis, K, Sauveron, D & Mayes, K 2009, Smart Cards. in H Bidgoli (ed.), Handbook of Technology Management. John Wiley & Sons.
2007

CH10🔗Markantonakis, K , Mayes, K, Tunstall, M & Sauveron, D 2007, Smart card Security. in N Nadia, C Leandro dos Santos & M Luiza de Macedo (eds), Mobile Robots: The Evolutionary Approach. vol. 50, Studies in Computational Intelligence, vol. 50, pp. 205.

CH9🔗Markantonakis, K, Piper, F & Mayes, K 2007, Smart Cards for Security and Assurance. in Managing Information Assurance in Financial Services. Information Science Publishing.

CH8🔗Markantonakis, K , Mayes, K, Tunstall, M & Sauveron, D 2007, Smart Cards: Communication Protocols and Applications. in Smart Cards: Communication Protocols and Applications.
2006

CH7🔗Mayes, K , Markantonakis, K & Chen, C 2006, Smart card Platform-Fingerprinting: Smart Card Technology International. in M Locke (ed.), Smart Card Technology International: The Global Journal of Advanced Card Technology. Smart Card Technology International, pp. 78.

CH6🔗Sauveron, D, Dusart, P, Trotin, A , Markantonakis, K & Mayes, K 2006, Security Evaluation and Certification Process. in N Nedjah, A Abraham & M Luiza de Macedo (eds), Computational Intelligence in Information Assurance and Security. Springer-Verlag.

CH5🔗Markantonakis, K , Mayes, K, Piper, F & Tunstall, M 2006, Smart card Security. in N Nedjah, A Abraham & M Luiza de Macedo (eds), Computational Intelligence in Information Assurance and Security. Springer-Verlag.
2004

CH4🔗Mayes, K, Al Hussein, M & Markantonakis, K 2004, Increasing Awareness of Smart card System Security Issues: Smart Card Technology International Journal. in M Locke (ed.), Smart Card Technology International Journal. Smart Card Technology International.
2001

CH3🔗Markantonakis, K 2001, Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? in Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. IFIP/Sec ’01, Kluwer, B.V., pp. 77-92.
1999

CH2🔗Markantonakis, K 1999, Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. in Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, pp. 230-243.

CH1🔗Markantonakis, K & Xenitellis, S 1999, Implementing a Secure Log File Download Manager for the Java Card. in Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. CMS ’99, Kluwer, B.V., pp. 143-162.

Article

2015

AR23🔗Akram, RN , Markantonakis, K & Sauveron, D 2015, ‘ A Novel Consumer-Centric Card Management Architecture and Potential Security IssuesJournal of Information Science, vol 321, pp. 150–161. DOI: 10.1016/j.ins.2014.12.049
2014

AR22🔗Abu Ghazalah, S , Markantonakis, K & Mayes, K 2014, ‘ A Formally Verified Mutual Authentication Protocol for Low-Cost RFID TagsInternational Journal of RFID Security and Cryprography (IJRFIDSC), vol 3, no. 2, pp. 156-169.

AR21🔗Cobourne, S , Kyrillidis, L , Mayes, K & Markantonakis, K 2014, ‘ Remote E-Voting Using the Smart Card Web ServerInternational Journal of Secure Software Engineering (IJSSE), vol 5, no. 1, pp. 39-60. DOI: 10.4018/ijsse.2014010103
2011

AR19🔗Mayes, K , Markantonakis, K, Ahmad, Z & Dong, S 2011, ‘ Considerations for Mobile Authentication in the CloudInformation Security Technical Report, vol 16, pp. 123-130.

AR18🔗Mayes, K , Cobourne, S & Markantonakis, K 2011, ‘ Near Field Technology in Challenging EnvironmentsSmart Card Technology International, vol NFC and Contactless, pp. 65-69.
2010

AR17🔗Francis, L , Hancke, G , Mayes, K & Markantonakis, K 2010, ‘ On the security issues of NFC enabled mobile phonesInternational Journal of Internet Technology and Secured Transactions, vol 2, pp. 336-356. DOI: 10.1504/IJITST.2010.037408

AR15🔗Leng, X, Lien, Y-H , Mayes, K & Markantonakis, K 2010, ‘ An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividingInternational Journal of Security and Networks, vol 5, pp. 79-86. DOI: 10.1504/IJSN.2010.032206

AR14🔗Hart, J , Markantonakis, K & Mayes, K 2010, ‘ Website Credential Storage and Two-Factor Web Authentication with a Java SIMInformation security theory and practices: security and privacy of pervasive systems and smart devices, vol 6033, pp. 229-236. DOI: 10.1007/978-3-642-12368-9_17
2009

AR13🔗Markantonakis, K, Tunstall, M , Hancke, G, Askoxylakis, I & Mayes, K 2009, ‘ Attacking smart card systems: Theory and practiceInformation Security Technical Report, vol 14, pp. 46-56. DOI: 10.1016/j.istr.2009.06.001

AR12🔗Mayes, KE , Markantonakis, K & Hancke, G 2009, ‘ Transport ticketing security and fraud controlsInformation Security Technical Report, vol 14, no. 2, pp. 87-95. DOI: 10.1016/j.istr.2009.06.003

2008

AR10🔗Mayes, KE & Markantonakis, K 2008, ‘ Mobile communication security controllers an evaluation paperInformation Security Technical Report, vol 13, pp. 173-192. DOI: 10.1016/j.istr.2008.09.004

AR9🔗Leng, X , Mayes, K & Markantonakis, K 2008, ‘ HB-MP+ Protocol: An Improvement on the HB-MP ProtocolIEEE International Conference on RFID — IEEE RFID 2008, pp. 118-124.
2007

AR8🔗Markantonakis, K & Mayes, K 2007, ‘ Problems and prospects of multi application smart cards in the UK financial industryIcebe 2007: ieee international conference on e-Business engineering, proceedings, pp. 447-452.
2006

AR7🔗Zhang, Q , Markantonakis, K & Mayes, K 2006, ‘ A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment ProtocolE-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on, vol 0, pp. 20. DOI: http://doi.ieeecomputersociety.org/10.1109/CEC-EEE.2006.6

AR6🔗Mayes, KE & Markantonakis, K 2006, ‘ On the potential of high density smart cardsInformation Security Technical Report, vol 11, no. 3, pp. 147 – 153. DOI: DOI: 10.1016/j.istr.2006.05.002
2005

AR5🔗Markantonakis, K , Mayes, K & Fred, P 2005, ‘ Smart card based authentication – any future?Computers and Security, vol 24, no. 3, pp. 188-191.
2003

AR4🔗Markantonakis, K & Mayes, K 2003, ‘ An overview of the GlobalPlatform smart card specificationInformation Security Technical Report, vol 8, no. 1, pp. 17 – 29. DOI: DOI: 10.1016/S1363-4127(03)00103-1

AR3🔗Mayes, K & Markantonakis, K 2003, ‘ Are we smart about security?Information Security Technical Report, vol 8, no. 1, pp. 6 – 16. DOI: DOI: 10.1016/S1363-4127(03)00102-X
1998

AR1🔗Markantonakis, K 1998, ‘ Java card technology and securityInformation Security Technical Report, vol 3, no. 2, pp. 82 – 89.

Paper

2017

PA12🔗Akram, RN , Markantonakis, K , Mayes, K, Habachi, O, Sauveron, D, Steyven, A & Chaumette, S 2017, ‘ Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones‘ Paper presented at The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17/09/1721/09/17, pp. 1-12. DOI: 10.1109/DASC.2017.8101984

PA11🔗Gurulian, I, Hancke, G , Markantonakis, K & Akram, RN 2017, ‘ May The Force Be With You: Force-Based Relay Attack Detection‘ Paper presented at 17th Smart Card Research and Advanced Application Conference, Lugano, Switzerland, 13/11/1715/11/17, .

PA10🔗Ducray, B , Cobourne, S , Mayes, K & Markantonakis, K 2017, ‘ Comparison of Dynamic Biometric Security Characteristics against other Biometrics‘ Paper presented at IEEE International Conference on Communications, Paris, France, 21/05/1725/05/17, . DOI: 10.1109/ICC.2017.7996938

PA9🔗Ducray, B , Cobourne, S , Mayes, K & Markantonakis, K 2017, ‘ Gesture Recognition Implemented on a Personal Limited Device.‘ Paper presented at International Conference on Information and Communication Systems, Irbid, Jordan, 4/04/176/04/17, . DOI: 10.1109/IACS.2017.7921966
2016

PA8🔗Abu Ghazalah, S & Markantonakis, K 2016, ‘ Two Rounds RFID Grouping-Proof Protocol‘ Paper presented at The 2016 IEEE International Conference on RFID , Orlando, United States, 3/05/165/05/16, pp. 193-203. DOI: 10.1109/RFID.2016.7488022
2010

PA7🔗Francis, L , Hancke, G (ed.) , Mayes, K (ed.) & Markantonakis, K (ed.) 2010, ‘ A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions‘ Paper presented at 2010 Sixth Advanced International Conference on Telecommunications, Barcelona, United Kingdom, 9/05/0915/05/09, pp. 452-461. DOI: http://doi.ieeecomputersociety.org/10.1109/AICT.2010.52
2006

PA4🔗Sirett, WG , Markantonakis, K & Mayes, K 2006, ‘ Implementation of Temporally Aware Behaviour-Based Security in Smart Cards‘ Paper presented at 1st International Workshop on Secure Information Systems (SIS ’06), Poland, 1/11/06, .

PA3🔗Markantonakis, K, Tunstall, M & Mayes, K 2006, ‘ Security of Open Satellite TV Receivers‘ Paper presented at 7th Edition of e-smart conference and demos, Sophia Antipolis, French Riviera, France, 20/09/0622/09/06, .

PA2🔗Chaumette, S , Markantonakis, K , Mayes, K & Sauveron, D 2006, ‘ The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos‘ Paper presented at 7th Edition of e-smart conference and demos, Sophia Antipolis, French Riviera, France, 20/09/0622/09/06, .
2005

PA1🔗Francis, L, Sirett, WG , Mayes, K & Markantonakis, K 2005, ‘ Countermeasures for attacks on satellite TV cards using open receivers‘ Paper presented at Third Australasian Information Security Workshop, Newcastle, Australia, 1/01/052/05/05, pp. 153–158.

Other contribution

2014

OT11🔗Mansor, H , Markantonakis, K & Mayes, K 2014, CAN Bus Risk Analysis Revisit. in D Naccache & D Sauveron (eds), Information Security Theory and Practice. Securing the Internet of Things. vol. 8501, Lecture Notes in Computer Science, vol. 8501, Springer, pp. 170-179. DOI: 10.1007/978-3-662-43826-8_13
2009

OT10🔗Askoxylakis, IG , Markantonakis, K, Tryfonas, T, May, J & Traganitis, A 2009, A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. in F Granelli, C Skianis, P Chatzimisios, Y Xiao, S Redana, O Akan, P Bellavista, J Cao, F Dressler, D Ferrari, M Gerla, H Kobayashi, S Palazzo, S Sahni, XS Shen, M Stan, J Xiaohua, A Zomaya & G Coulson (eds), Mobile Lightweight Wireless Systems. vol. 13, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin / Heidelberg, pp. 103-113.
2004

OT4🔗Markantonakis, K & Mayes, K 2004, Smart Card Technology in the Public Transport Industry: Secure Magazine – The Silicon Trust Report. in Secure Magazine – The Silicon Trust Report. 1 edn, The Silicon Trust, pp. 26.
1999

OT1🔗Markantonakis, K 1999, Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework). in Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 edn, vol. 4, Elsevier, pp. 69.

Special issue

2011

SI1🔗Sauveron, D , Markantonakis, K , Mayes, K & Verikoukis, C (eds) 2011, ‘ Security and Resilience for Smart Devices and ApplicationsEURASIP Journal on Wireless Communications and Networking, vol 2011.