All Publications

My Google Scholar profile can be obtained from here.

Books

BK3 Keith Mayes, Konstantinos Markantonakis, “http://www.springer.com/computer/security+and+cryptology/book/978-0-387-72197-2 Smart Cards, Tokens, Security and Applications”, Springer, Pages 392, 2008, ISBN 978-0-387-72198-9.

2014

BK2🔗Mayes, K & Markantonakis, K 2014, Secure Smart, Embedded Devices, Platforms and Applications. Springer.

2010

BK1🔗Mayes, K & Markantonakis, K 2010, Smart Cards, Tokens, Security and Applications. Springer.

Publications

Total amount of papers: 202
[202] Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos MarkantonakisA Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices‘.

[201] Carlton Shepherd, Benjamin Semal, Konstantinos MarkantonakisInvestigating Black-Box Function Recognition Using Hardware Performance Counters‘, IEEE Transactions on Computers.

[200] F Thomas-Brans, Thibaut Heckmann, Konstantinos Markantonakis, Damien Sauveron ‘New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards‘, IEEE Access, vol. 10, pp. 2 – 7. https://doi.org/10.1109/ACCESS.2022.3158958

[199] Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Carlton Shepherd, Benjamin Semal A DLT-based Smart Contract Architecture for Atomic and Scalable Trading‘ pp. 1-18. <https://arxiv.org/abs/2105.02937

[198] Vihangi Vagal , Konstantinos Markantonakis, Carlton Shepherd A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles. in 40th IEEE Digital Avionics Systems Conference (DASC). IEEE.

[197] Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. in IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy ’21). vol. 1, IEEE, pp. 221-227. https://doi.org/10.1109/SPW53761.2021.00036

[196] Benjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan KalbantnerOne Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud‘, Paper presented at 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom ), Guangzhou, China, 29/12/20 – 1/01/21. https://doi.org/10.1109/TrustCom50675.2020.00053

[195] Jan Kalbantner, Konstantinos Markantonakis, Darren Hurley-Smith, Raja Naeem Akram, Benjamin Semal ‘P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time‘, Energies, vol. 14, no. 3, 606, pp. 1-25. https://doi.org/10.3390/en14030606

[194] Carlton Shepherd, Konstantinos Markantonakis, Nico Van Heijningen, Driss Aboulkassimi, Clement Gaine, Thibaut Heckmann, David Naccache ‘Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis‘, Computers and Security. https://doi.org/10.1016/j.cose.2021.102471

[193] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos MarkantonakisPrivacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns‘, IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2021.3059047

[192] Qiao HU, Bianxia DU, Konstantinos Markantonakis, Gerhard Hancke ‘A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement‘, IEEE Transactions on Industrial Informatics, vol. 16, no. 1, pp. 691-702. https://doi.org/10.1109/TII.2019.2923662

[191] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan KalbantnerA Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service‘, Paper presented at 2nd Workshop on Cloud Security and Privacy, Rome, Italy, 19/10/20 – 22/10/20 pp. 360-377. https://doi.org/10.1007/978-3-030-61638-0_20

[190] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan KalbantnerLeaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems‘, Paper presented at 35th International Conference on ICT Systems Security and Privacy Protection, Maribor, Slovenia, 26/05/20 – 28/05/20 pp. 3-16. https://doi.org/10.1007/978-3-030-58201-2_1

[189] George-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache ‘Return-Oriented Programming on RISC-V‘, Paper presented at ACM ASIACCS , Taipei, Taiwan, Province of China, 5/10/20 – 9/10/20 pp. 471-480. https://doi.org/10.1145/3320269.3384738

[188] James Tapsell, Raja Naeem Akram, Konstantinos MarkantonakisAn Evaluation of the Security of the Bitcoin Peer-To-Peer Network‘, Paper presented at The IEEE Conference on Blockchain , Halifax, Canada, 30/07/18 – 3/08/18 pp. 1-6. https://doi.org/10.1109/Cybermatics_2018.2018.00195

[187] Robert Lee, Konstantinos Markantonakis, Raja Naeem Akram ‘Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices‘, ACM Transactions on Embedded Computing Systems, vol. 18, no. 3, 26, pp. 1-21. https://doi.org/10.1145/3284361

[186] Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos MarkantonakisE-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy‘, Paper presented at The IEEE Conference on Blockchain , Halifax, Canada, 30/07/18 – 3/08/18 pp. 1-7. https://doi.org/10.1109/Cybermatics_2018.2018.00262

[185] Dr. Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Christopher Watkins Location Tracking Using Smartphone Accelerometer and Magnetometer Traces. in The First Location Privacy Workshop (LPW ), the 14th International Conference on Availability, Reliability and Security (ARES )., 96, Association for Computing Machinery (ACM), pp. 1-9. https://doi.org/10.1145/3339252.3340518

[184] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis Remote Credential Management with Mutual Attestation for Trusted Execution Environments. in 12th IFIP International Conference on Information Security Theory and Practice (WISTP ’18). Lecture Notes in Computer Science, vol. 9, Springer, pp. 157-173, 12th IFIP International Conference on Information Security Theory and Practice, Brussels, Belgium, 10/12/18. https://doi.org/10.1007/978-3-030-20074-9_12

[183] Thibaut Heckmann, James McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache ‘Removing epoxy underfill between neighbouring components using acid for component chip-off‘, digital investigation, vol. 29, pp. 198-209. https://doi.org/10.1016/j.diin.2019.04.003

[182] Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram ‘A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks‘, Paper presented at The 37th DASC Digital Avionics Systems Conference, London, United Kingdom, 23/09/18 – 27/09/18 pp. 1-8. https://doi.org/10.1109/DASC.2018.8569730

[181] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette A Secure and Trusted Channel Protocol for UAVs Fleets. in Information Security Theory and Practice – 11th IFIP WG 11.2 International Conference, WISTP , Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1 LNCS, Springer-Verlag, pp. 3-24, 11th IFIP WG 11.2 International Conference on Information Security Theory and Practice, WISTP , Heraklion, Greece, 28/09/17. http://www.scopus.com/inward/record.url?scp=85049186566&partnerID=8YFLogxK

[180] James Tapsell, Raja Naeem Akram, Konstantinos MarkantonakisConsumer Centric Data Control, Tracking and Transparency – A Position Paper‘, Paper presented at The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, United States, 31/07/18 – 3/08/18 pp. 1-6. https://arxiv.org/abs/1805.04747

[179] Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper. in O Blazy & CY Yeun (eds), The 12th WISTP International Conference on Information Security Theory and Practice (WISTP’). Lecture Notes in Computer Science, Springer-Verlag, Brussels, Belgium. <https://www.springerprofessional.de/en/deep-learning-application-in-security-and-privacy-theory-and-pra/16718018

[178] Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. in 11th IFIP International Conference on Information Security Theory and Practice (WISTP’17). Lecture Notes in Computer Science, vol. 1, Springer, pp. 75-92. https://doi.org/10.1007/978-3-319-93524-9_5

[177] Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos MarkantonakisFair and Transparent Blockchain based Tendering Framework – A Step Towards Open Governance‘, Paper presented at The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, United States, 31/07/18 – 3/08/18 pp. 1-6. https://arxiv.org/abs/1805.05844

[176] Thibaut Heckmann, Konstantinos Markantonakis, David Naccache, Thomas Souvignet ‘Forensic smartphone analysis using adhesives: Transplantation of Package on Package components‘, digital investigation, vol. 26, pp. 29-39. https://doi.org/10.1016/j.diin.2018.05.005

[175] Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram ‘Good Vibrations: Artificial Ambience-Based Relay Attack Detection‘, Paper presented at The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York, United States, 31/07/18 – 3/08/18 pp. 1-9. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075

[174] Iakovos Gurulian, Gerhard Hancke, Konstantinos Markantonakis, Raja Naeem Akram ‘May The Force Be With You: Force-Based Relay Attack Detection‘, Paper presented at 17th Smart Card Research and Advanced Application Conference, Lugano, Switzerland, 13/11/17 – 15/11/17 pp. 142-159. https://doi.org/10.1007/978-3-319-75208-2_9

[173] Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes Philanthropy on the Blockchain. in The 11th WISTP International Conference on Information Security Theory and Practice (WISTP’). Lecture Notes in Computer Science (LNCS), vol. 1, Springer, pp. 25-38. https://doi.org/10.1007/978-3-319-93524-9_2

[172] Carlton Shepherd, Fabien Petitcolas, Raja Naeem Akram, Konstantinos Markantonakis An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. in J Lopez, S Fischer-Hübner & C Lambrinoudakis (eds), Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus , Lyon, France, August 30-31, , Proceedings. Lecture Notes in Computer Science, vol. 2, Springer-Verlag, pp. 164-179, 14th International Conference on Trust, Privacy & Security in Digital Business, Lyon, France, 28/08/17. https://doi.org/10.1007/978-3-319-64483-7_11

[171] Iakovos Gurulian, Konstantinos Markantonakis, Raja Akram, Keith Mayes Artificial Ambient Environments for Proximity Critical Applications. in ARES ’17: Proceedings of the 12th International Conference on Availability, Reliability and Security., 5, ACM, pp. 1-10. https://doi.org/10.1145/3098954.3098964

[170] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis A Smart Card Web Server in the Web of Things. in SAI Intelligent Systems Conference (IntelliSys ). Lecture Notes in Networks and Systems , vol. 16, Springer, pp. 769-784. https://doi.org/10.1007/978-3-319-56991-8_55

[169] Md Hassan, Konstantinos Markantonakis, Raja Akram Can you call the software in your device firmware? in e-Business Engineering (ICEBE), IEEE 13th International Conference on. IEEE Computer Society Press, Macau, China, pp. 1-8, The 13th IEEE International Conference on e-Business Engineering (ICEBE ), Macau, China, 4/11/16. https://doi.org/10.1109/ICEBE.2016.040

[168] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos MarkantonakisComparison of dynamic biometrie security characteristics against other biometrics‘, Paper presented at IEEE International Conference on Communications, Paris, France, 21/05/17 – 25/05/17 pp. 1-7. https://doi.org/10.1109/ICC.2017.7996938

[167] Assad Umar, Raja Naeem Akram, Keith Mayes, Konstantinos Markantonakis Ecosystems of Trusted Execution Environment on smartphones – a potentially bumpy road. in P Urien & S Piramuthu (eds), Mobile and Secure Services (MobiSecServ), Third International Conference on. IEEE, pp. 1-8, 3rd International Conference on Mobile and Secure Services (MobiSecServ), Miami Beach, 11/02/17. https://doi.org/10.1109/MOBISECSERV.2017.7886559

[166] Danushka Jayasinghe, Konstantinos Markantonakis, Raja Akram, Keith Mayes Enhancing EMV Tokenisation with Dynamic Transaction Tokens. in G Hancke & K Markantonakis (eds), Radio Frequency Identification and IoT Security: RFIDSec . Lecture Notes in Computer Science , vol. 5, Springer, pp. 107-122. https://doi.org/10.1007/978-3-319-62024-4_8

[165] Carlton Shepherd, Raja Akram, Konstantinos Markantonakis Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. in 12th International Conference on Availability, Reliability and Security (ARES ’17). ACM, pp. 1-10, 12th International Conference on Availability, Reliability and Security , Reggio Calabria, Italy, 29/08/17. https://doi.org/10.1145/3098954.3098971

[164] Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Akram Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. in Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS ’17. ACM, New York, pp. 21-32 , 3rd ACM Cyber-Physical System Security Workshop (CPSS ), Abu Dhabi, United Arab Emirates, 2/04/17. https://doi.org/10.1145/3055186.3055201

[163] Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Akram, Keith Mayes Extending EMV Tokenised Payments To Offline-Environments. in The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 1-8. https://doi.org/10.1109/TrustCom.2016.0095

[162] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos MarkantonakisGesture recognition implemented on a personal limited device‘, Paper presented at International Conference on Information and Communication Systems, Irbid, Jordan, 4/04/17 – 6/04/17 pp. 1-6. https://doi.org/10.1109/IACS.2017.7921966

[161] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Iakovos Gurulian Log Your Car: Reliable Maintenance Services Record. in Information Security and Cryptology: 12th International Conference, Inscrypt , Beijing, China, November 4-6, , Revised Selected Papers. vol. 3, Lecture Notes in Computer Science , vol. 3, Springer, pp. 484-504, 12th International Conference on Information Security and Cryptology (Inscrypt), Beijing, China, 4/11/16. https://doi.org/10.1007/978-3-319-54705-3_30

[160] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Iakovos Gurulian Log Your Car: The Non-invasive Vehicle Forensics. in Y Xiang, K Ren & D Feng (eds), 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 974-982. https://doi.org/10.1109/TrustCom.2016.0164

[159] Konstantinos Markantonakis, Raja Naeem Akram Multi-Application Smart Card Platforms and Operating Systems. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 59-92. https://doi.org/10.1007/978-3-319-50500-8_3

[158] Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Eibe Frank, Raja Akram, Keith Mayes On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. in Trustcom/BigDataSE/ICESS, IEEE. pp. 41-49, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Sydney, Australia, 1/08/17. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218

[157] Iakovos Gurulian, Raja Akram, Konstantinos Markantonakis, Keith Mayes Preventing relay attacks in mobile transactions using infrared light. in SAC ’17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, pp. -, The 32nd ACM Symposium on Applied Computing, Marrakesh, Morocco, 3/04/17. https://doi.org/10.1145/3019612.3019794

[156] Robert Lee, Konstantinos Markantonakis, Raja Akram Provisioning Software with Hardware-Software Binding. in FARES ’17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security., 49, ACM, pp. 1-9. https://doi.org/10.1145/3098954.3103158

[155] Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Akram Proximity Assurances Based on Natural and Artificial Ambient Environments. in 10th International Conference, SecITC , Bucharest, Romania, June 8–9, , Revised Selected Papers. Security and Cryptology, vol. 3, Springer, pp. 83-103, 10th International Conference on Security for Information Technology and Communications, Bucharest, Romania, 8/07/16. https://doi.org/10.1007/978-3-319-69284-5

[154] Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert Lee, Konstantinos Markantonakis, Raja Akram, Damien Sauveron, Emmanuel Conchon Secure and Trusted Execution: Past, Present, and Future – A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. in Y Xiang, K Ren & D Feng (eds), 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . IEEE Computer Society, pp. 168-177. https://doi.org/10.1109/TrustCom.2016.0060

[153] Raja Akram, Pierre-Francois Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. in Y Xiang, K Ren & D Feng (eds), 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, pp. 606-614. https://doi.org/10.1109/TrustCom.2016.0116

[152] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette ‘Security, privacy and safety evaluation of dynamic and static fleets of drones‘, Paper presented at The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17/09/17 – 21/09/17 pp. 1-12. https://doi.org/10.1109/DASC.2017.8101984

[151] Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette Serverless protocols for inventory and tracking with a UAV. in Digital Avionics Systems Conference (DASC), IEEE/AIAA 36th. IEEE Computer Society Press, St. Petersburg, Florida, USA, pp. 1-11, The 36th IEEE/AIAA Digital Avionics Systems Conference , St. Petersburg, United States, 17/09/17. https://doi.org/10.1109/DASC.2017.8102113

[150] Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis Smart Card Reader and Mobile APIs. in K Mayes & K Markantonakis (eds), Smart Cards, Tokens, Security and Applications. Springer International Publishing, Cham, pp. 305-349. https://doi.org/10.1007/978-3-319-50500-8_12

[149] Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Akram, Keith Mayes, Emmanouil Panaousis The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. in Mobile Security Technologies (MoST ’17), IEEE Security & Privacy Workshops. IEEE, pp. 179-188, IEEE Mobile Security Technologies (MOST) , San Jose, United States, 25/05/17. https://doi.org/10.1109/SPW.2017.29

[148] Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis Tokenisation Blacklisting Using Linkable Group Signatures. in Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 182-198. https://doi.org/10.1007/978-3-319-59608-2_10

[147] Carlton Shepherd, Raja Akram, Konstantinos Markantonakis Towards trusted execution of multi-modal continuous authentication schemes. in Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC ’17). ACM, Marrakech, Morocco, pp. -. https://doi.org/10.1145/3019612.3019652

[146] Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette An efficient, secure and trusted channel protocol for avionics wireless networks. in A Roy & W Schuster (eds), IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE Computer Society, pp. 1-10. https://doi.org/10.1109/DASC.2016.7777967

[145] Konstantinos Markantonakis, Raja Akram A secure and trusted boot process for Avionics Wireless Networks. in Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, pp. 1C3-1-1C3-9. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7486322

[144] Robert Lee, Konstantinos Markantonakis, Raja Akram Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting. in CPSS ’16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, ACM Press, pp. 70-81. https://doi.org/10.1145/2899015.2899029

[143] Raja Akram, Konstantinos Markantonakis Challenges of security and trust of mobile devices as digital avionics component. in Integrated Communications Navigation and Surveillance (ICNS), . IEEE Computer Society, pp. 1C4-1-1C4-11. https://doi.org/10.1109/ICNSURV.2016.7486323

[142] Konstantinos Markantonakis, Raja Akram, Mehari Msgna Secure and Trusted Application Execution on Embedded Devices. in D Naccache & E Simion (eds), 8th International Conference on Security for Information Technology and Communications – SECITC’15 . vol. , Springer, pp. 3-24. https://doi.org/10.1007/978-3-319-27179-8_1

[141] Mehari Msgna, Houda Ferradi, Raja Akram, Konstantinos Markantonakis Secure Application Execution in Mobile Devices. in PA Ryan, D Naccache & J-J Quisquater (eds), The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science , vol. , Security and Cryptology – sub series , Springer, pp. 417-438. https://doi.org/10.1007/978-3-662-49301-4_26

[140] Raja Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-Francois Bonnefoi, Damien Sauveron, Serge Chaumette Security and performance comparison of different secure channel protocols for Avionics Wireless Networks. in A Roy & W Schuster (eds), IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). IEEE Computer Society, pp. 1-8. https://doi.org/10.1109/DASC.2016.7777966

[139] Sarah Abu Ghazalah, Konstantinos MarkantonakisTwo Rounds RFID Grouping-Proof Protocol‘, Paper presented at The IEEE International Conference on RFID , Orlando, United States, 3/05/16 – 5/05/16 pp. 193-203. http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7488022

[138] Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith MayesYou can’t touch this: Consumer-centric android application repackaging detection‘, Future Generation Computer Systems, vol. 65, pp. 1-9. https://doi.org/10./j.future..05.021, http://www.sciencedirect.com/science/article/pii/S0167739X16301327

[137] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron ‘A Novel Consumer-Centric Card Management Architecture and Potential Security Issues‘, Journal of Information Science, vol. 321, pp. 150–161. http://www.sciencedirect.com/science/article/pii/S0020025514012018

[136] Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Akram, Konstantinos Markantonakis A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. in The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, pp. 1-9. https://doi.org/10.1109/Trustcom.2015.426

[135] Benoit Ducray, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis Authentication based on a changeable biometric using gesture recognition with the Kinect™. in International Conference on Biometrics (ICB). IEEE, pp. 38-45 . https://ieeexplore.ieee.org/document/7139073

[134] Raja Akram, Konstantinos Markantonakis, Sharadha Kariyawasam, Shahid Ayub, Amar Seem, Robert Atkinson Challenges of security and trust in Avionics Wireless Networks. in IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, pp. 4B1-1-4B1-12. https://doi.org/10.1109/DASC.2015.7311416

[133] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. in 10th International Conference on Availability, Reliability and Security: ARES . IEEE, pp. 139-148. https://doi.org/10.1109/ARES.2015.58

[132] Danushka Jayasinghe, Raja Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes Enhancing EMV Online PIN Verification. in The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). IEEE Computer Society, Helsinki, Finland, pp. 1-10. https://doi.org/10.1109/Trustcom.2015.451

[131] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. in PYA Ryan & E Weippl (eds), Computer Security — ESORICS : 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, , Proceedings, Part II. Lecture Notes in Computer Science, vol. , Springer, Vienna, Austria, pp. 541-560. https://doi.org/10.1007/978-3-319-24177-7_27

[130] Raja Akram, Konstantinos Markantonakis, Damien Sauveron Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures. in Z Yan & P Mueller (eds), The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, Helsinki, Finland, pp. 1-8. https://doi.org/10.1109/Trustcom.2015.410

[129] Hafizah Mansor, Konstantinos Markantonakis, Raja Akram, Keith Mayes Let’s Get Mobile: Secure FOTA for Automotive System. in Network and System Security. vol. , Lecture Notes in Computer Science, vol. , Springer, pp. 503-510. http://link.springer.com/chapter/10.1007%2F978-3-319-25645-0_38

[128] Assad Umar, Keith Mayes, Konstantinos Markantonakis Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element. in First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, pp. 1-6. http://ieeexplore.ieee.org/document/7072872/

[127] Sheila Cobourne, Graham Hili, Keith Mayes, Konstantinos Markantonakis Practical Attacks on Virtual Worlds. in J Lopez, I Ray & B Crispo (eds), Risks and Security of Internet and Systems: 9th International Conference, CRiSIS , Trento, Italy, August 27-29, , Revised Selected Papers. 1 edn, vol. , Lecture Notes in Computer Science, Springer International Publishing, pp. 180-195. https://doi.org/10.1007/978-3-319-17127-2

[126] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith MayesA Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags‘, International Journal of RFID Security and Cryprography (IJRFIDSC), vol. 3, no. 2, pp. 156-169. https://doi.org/10.20533/ijrfidsc.2046.3715.2014.0018

[125] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes An Introduction to Java Card Programming. in Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 497-513. https://doi.org/10.1007/978-1-4614-7915-4_22

[124] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes An Introduction to the Trusted Platform Module and Mobile Trusted Module. in K Markantonakis & K Mayes (eds), Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 71-93. https://doi.org/10.1007/978-1-4614-7915-4_4

[123] Sheila Cobourne, Graham Hili, Keith Mayes, Konstantinos Markantonakis Avatar Voting in Virtual Worlds. in 5th International Conference on Information and Communication Systems (ICICS), . IEEE, pp. 1 – 6 . https://doi.org/10.1109/IACS.2014.6841982

[122] Hafizah Mansor, Konstantinos Markantonakis, Keith Mayes CAN Bus Risk Analysis Revisit. in D Naccache & D Sauveron (eds), Information Security Theory and Practice. Securing the Internet of Things. vol. , Lecture Notes in Computer Science, vol. , Springer, pp. 170-179. https://doi.org/10.1007/978-3-662-43826-8_13

[121] Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. in Y Liu (ed.), The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society Press.

[120] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains. in The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE ). IEEE Computer Society Press, pp. 871- 878, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment, Victoria, Canada, 13/05/14.

[119] Danushka Jayasinghe, Konstantinos Markantonakis, Keith Mayes Optimistic Fair-Exchange with Anonymity for Bitcoin Users. in The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). IEEE Computer Society, Guangzhou, China, pp. 44-51. https://doi.org/10.1109/ICEBE.2014.20

[118] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes Precise Instruction-Level Side Channel Profiling of Embedded Processors. in Information Security Practice and Experience: 10th International Conference, ISPEC , Fuzhou, China, May 5-8, . Proceedings. vol. , Lecture Notes in Computer Science, pp. 129-143. http://link.springer.com/chapter/10.1007/978-3-319-06320-1_11

[117] Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos MarkantonakisRemote E-Voting Using the Smart Card Web Server‘, International Journal of Secure Software Engineering (IJSSE), vol. 5, no. 1, pp. 39-60. https://doi.org/10.4018/ijsse.2014010103

[116] Raja Naeem Akram, Konstantinos Markantonakis Rethinking the Smart Card Technology, Invited Paper. in T Tryfonas & I Askoxylakis (eds), 16th International Conference on Human-Computer Interaction. Springer.

[115] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes Secure Improved Cloud-Based RFID Authentication Protocol. in The 9th DPM International Workshop on Data Privacy Management (DPM ). Springer.

[114] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR. in The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society.

[113] Keith Mayes, Konstantinos Markantonakis Secure Smart, Embedded Devices, Platforms and Applications. Springer.

[112] Graham Hili, Keith Mayes, Konstantinos Markantonakis The BIOS and Rootkits. in K Markantonakis & DK Mayes (eds), Secure Smart Embedded Devices, Platforms and Applications. Springer, pp. 369-381. https://doi.org/10.1007/978-1-4614-7915-4_16

[111] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Trusted Platform Module for Smart Cards. in O Alfandi (ed.), 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE Computer Society Press, Dubai, UAE.

[110] Mehari Msgna, Konstantinos Markantonakis, David Naccache, Keith Mayes Verifying Software Integrity in Embedded Systems: A Side Channel Approach. in Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE , Paris, France, April 13-15, . Revised Selected Papers. Lecture Notes in Computer Science, Paris, France, pp. 261-280. http://link.springer.com/chapter/10.1007/978-3-319-10175-0_18

[109] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA. in The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC ). IEEE Computer Society Press, London, pp. 44-51.

[108] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model. in 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). IEEE Computer Society Press, Melbourne, Australia.

[107] Sarah Abu Ghazalah, Konstantinos Markantonakis, Keith Mayes A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. in The 25th IFIP International Information Security Conference (SEC ). vol. 405, Springer-Verlag, pp. 102-110.

[106] Lazaros Kyrillidis, Boris Chazalet, Keith Mayes, Konstantinos Markantonakis Card-present Transactions On The Internet Using The Smart Card Web Server. in Proceedings of TrustCom . IEEE Computer Society, pp. 611-619, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Australia, 16/07/13. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6680893

[105] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Recovering from Lost Digital Wallet. in FGM Y. Xiang & S Ruj (eds), The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13).

[104] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Remote Attestation Mechanism based on Physical Unclonable Functions. in CM J. Zhou & J Weng (eds), The Workshop on RFID and IoT Security (RFIDsec’13 Asia). IOS Press, Guangzhou, China.

[103] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators. in S Qing & J Zhou (eds), 5th International Conference on Information and Communications Security (ICICS ). Springer, Beijing, China.

[102] Raja Naeem Akram, Konstantinos Markantonakis Smart Cards: State-of-the-Art to Future Directions, Invited Paper. in C Douligeris & D Serpanos (eds), IEEE International Symposium on Signal Processing and Information Technology (ISSPIT ). IEEE Computer Science, Athens, Greece.

[101] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram Subscriber Centric Conditional Access System for Pay-TV Systems. in IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. pp. 459-455. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6686303&tag=1

[100] Mehari Msgna, Konstantinos Markantonakis, Keith Mayes The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. in Security and Privacy in Communication Networks: 9th International ICST Conference. vol. 127, Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering, vol. 127, Sydney, Australia, pp. 288-304. http://link.springer.com/chapter/10.1007/978-3-319-04283-1_18

[99] Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis Using the Smart Card Web Server in Secure Branchless Banking. in J Lopez, X Huang & R Sandhu (eds), Network and System Security: 7th International Conference, NSS , Madrid, Spain, June 3-4, . Proceedings. vol. , Lecture Notes In Computer Science, Springer-Verlag, pp. 250-263. https://doi.org/10.1007/978-3-642-38631-2_19

[98] Lazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis Virtual World Authentication Using the Smart Card Web Server. in S Thampi, P Atrey, C-I Fan & G Martinez Perez (eds), Security in Computing and Communications. Communications in Computer and Information Science, vol. 377, Springer-Verlag, pp. 30-41, International Symposium on Security in Computing and Communications, Mysore, India, 22/08/13. http://link.springer.com/chapter/10.1007%2F978-3-642-40576-1_4

[97] Keith Mayes, Lazaros Kyrillidis, Konstantinos Markantonakis, Song Dong ‘A Brief Comparison of NFC Smart Posters and Quick Response Codes‘, NFC & Contactless, pp. 74-78. <http://www.crisptelecom.com/files/nfcworld.pdf

[96] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Privacy Preserving Application Acquisition Protocol. in FGM Geyong Min (ed.), 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). IEEE Computer Society Press, Liverpool, United Kingdom.

[95] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Building the Bridges — A Proposal for Merging different Paradigms in Mobile NFC Ecosystem. in S Xie (ed.), The 8th International Conference on Computational Intelligence and Security (CIS ). IEEE Computer Society Press.

[94] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture. in KP Chow & LCK Hui (eds), The International Conference on Information and Communications Security (ICICS ). LNCS, Springer.

[93] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis Distributed e-Voting using the Smart Card Web Server. in F Martinelli, J-L Lanet, W Fitzgerald & S Foley (eds), Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS ). IEEE, 7th International Conference on Risks and Security of Internet and Systems (CRiSIS ), Cork, Ireland, 10/10/12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6378952

[92] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. in N-W Lo & Y Li (eds), The Workshop on RFID and IoT Security (RFIDsec Asia). vol. 8, Cryptology and Information Security Series, vol. 8, IOS Press, pp. 21 – 32, The Workshop on RFID and IoT Security (RFIDsec Asia), Taipei, Taiwan, Province of China, 8/11/12.

[91] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. in A Mana & M Klonowski (eds), 5th International Conference on New Technologies, Mobility and Security (NTMS).

[90] Xuefei Leng, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis Tag Group Authentication using Bit Collisions. in Information Security South Africa (ISSA). IEEE.

[89] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Application-Binding Protocol in the User Centric Smart Card Ownership Model. in U Parampalli & P Hawkes (eds), the 16th Australasian Conference on Information Security and Privacy (ACISP). LNCS, Springer, Melbourne, Australia, pp. 208-225.

[88] Keith Mayes, Konstantinos Markantonakis, Zaheer Ahmad, Song Dong ‘Considerations for Mobile Authentication in the Cloud‘, Information Security Technical Report, vol. 16, pp. 123-130.

[87] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Cross-Platform Application Sharing Mechanism. in H Wang, SR Tate & Y Xiang (eds), 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). IEEE Computer Society Press, Changsha, China.

[86] Keith Mayes, Sheila Cobourne, Konstantinos MarkantonakisNear Field Technology in Challenging Environments‘, Smart Card Technology International, vol. NFC and Contactless, pp. 65-69.

[85] Damien Sauveron (Guest editor), Konstantinos Markantonakis (Guest editor), Keith Mayes (Guest editor), Christos Verikoukis (Guest editor) ‘Security and Resilience for Smart Devices and Applications‘, EURASIP Journal on Wireless Communications and Networking, vol. .

[84] L. Kyrillidis, K. Mayes, K. Markantonakis Smart card web server. in S-I Ao & L Gelman (eds), Electrical Engineering and Applied Computing. Lecture Notes in Electrical Engineering, vol. 90, Springer, pp. 221-232. http://www.scopus.com/inward/record.url?scp=79959726960&partnerID=8YFLogxK

[83] Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis Smart Card Web Server. in S Ao & L Gelman (eds), Electrical Engineering and Applied Computing. vol. 90, Lecture Notes in Electrical Engineering, Springer Netherland, pp. 221-232. http://link.springer.com/chapter/10.1007/978-94-007-1192-1_19

[82] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes User Centric Security Model for Tamper-Resistant Devices. in J Li & J-Y Chung (eds), 8th IEEE International Conference on e-Business Engineering (ICEBE ). IEEE Computer Society Press.

[81] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. in K Rannenberg & V Varadharajan (eds), 25th IFIP International Information Security Conference (SEC ). IFIP AICT Series, Springer, Brisbane, Australia, pp. 161-171. https://doi.org/10.1007/978-3-642-15257-3_15

[80] Lishoy Francis, Keith Mayes, Gerhard Hancke, Konstantinos Markantonakis A location based security framework for authenticating mobile phones. in M-PAC ’10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. ACM, New York, NY, pp. 5:1-5:8. http://portal.acm.org/citation.cfm?doid=1890791.1890796

[79] Xuefei Leng, Yuan-Hung Lien, Keith Mayes, Konstantinos MarkantonakisAn RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing‘, International Journal of Security and Networks, vol. 5, pp. 79-86. http://dx.doi.org/10.1504/IJSN.2010.032206

[78] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes A Paradigm Shift in Smart Card Ownership Model. in BO Apduhan, O Gervasi, A Iglesias, D Taniar & M Gavrilova (eds), Proceedings of the International Conference on Computational Science and Its Applications (ICCSA ). IEEE Computer Society Press, Fukuoka, Japan, pp. 191-200. https://doi.org/10.1109/ICCSA.2010.52

[77] Lishoy Francis, Gerhard Hancke (Editor), Keith Mayes (Editor), Konstantinos Markantonakis (Editor) ‘A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions‘, Paper presented at Sixth Advanced International Conference on Telecommunications, Barcelona, United Kingdom, 9/05/09 – 15/05/09 pp. 452-461. http://doi.ieeecomputersociety.org/10.1109/AICT.2010.52

[76] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Firewall Mechanism in a User Centric Smart Card Ownership Model. in D Gollmann, J-L Lanet & J Iguchi-Cartigny (eds), Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS . vol. /, LNCS, Springer, Passau, Germany, pp. 118-132. https://doi.org/10.1007/978-3-642-12510-2

[75] Lishoy Francis, Keith Mayes, Kostas Markantonakis, Gerhard Hancke NFC Security Threats. in T Courtney (ed.), Near Field Communications: Smart Card Technology International. pp. 42-47. <http://www.globalsmart.com

[74] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos MarkantonakisOn the security issues of NFC enabled mobile phones‘, International Journal of Internet Technology and Secured Transactions, vol. 2, pp. 336-356. http://dx.doi.org/10.1504/IJITST.2010.037408

[73] Lishoy Francis, Gerhard Hancke, Keith Mayes, Konstantinos Markantonakis Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones. in S Ors Yalcin (ed.), Radio Frequency Identification: Security and Privacy Issues: RFIDSec . vol. , Lecture Notes in Computer Science, vol. , Springer Berlin / Heidelberg, pp. 35-49, RFIDSec , Istanbul, Turkey, 8/06/10. <http://eprint.iacr.org/2010/228.pdf

[72] Gerhard Hancke, Konstantinos Markantonakis, Keith MayesSecurity challenges for user-oriented RFID applications within the “Internet of things”‘, Journal of Internet Technology, vol. 11, no. 3, pp. 307.

[71] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Simulator Problem in User Centric Smart Card Ownership Model. in HY Tang & X Fu (eds), 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). IEEE Computer Society Press, HongKong, China. https://doi.org/10.1109/EUC.2010.108

[70] K. Mayes, K. Markantonakis Smart Cards, Tokens, Security and Applications. Springer. <http://books.google.co.uk/books?id=FpCqcQAACAAJ

[69] Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis Web Server on a SIM Card. in SI Ao, L Gelman, DWL Hukins, A Hunter & AM Korsunsky (eds), Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. vol. I, Newswood Limited, pp. 253-259, World Congress on Engineering, London, United Kingdom, 30/06/10. <http://www.iaeng.org/publication/WCE2010/WCE2010_pp253-259.pdf

[68] Jonathan Hart, Konstantinos Markantonakis, Keith MayesWebsite Credential Storage and Two-Factor Web Authentication with a Java SIM‘, Information security theory and practices: security and privacy of pervasive systems and smart devices, vol. , pp. 229-236. https://doi.org/10.1007/978-3-642-12368-9_17

[67] Ioannis G. Askoxylakis, Konstantinos Markantonakis, Theo Tryfonas, John May, Apostolos Traganitis A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks. in F Granelli, C Skianis, P Chatzimisios, Y Xiao, S Redana, O Akan, P Bellavista, J Cao, F Dressler, D Ferrari, M Gerla, H Kobayashi, S Palazzo, S Sahni, X Shen, M Stan, J Xiaohua, A Zomaya & G Coulson (eds), Mobile Lightweight Wireless Systems. vol. 13, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin / Heidelberg, pp. 103-113. <http://dx.doi.org/10.1007/978-3-642-03819-8_11

[66] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Application Management Framework in User Centric Smart Card Ownership Model. in HY YOUM & M Yung (eds), The 10th International Workshop on Information Security Applications (WISA09). vol. /, LNCS, Springer, Busan, Korea, pp. 20-35. https://doi.org/10.1007/978-3-642-10838-9_3

[65] G. Poulopoulos, K. Markantonakis, K. Mayes A secure and efficient mutual authentication protocol for low-cost RFID systems. in Proceedings – International Conference on Availability, Reliability and Security, ARES . pp. 706-711. http://www.scopus.com/inward/record.url?scp=70349687569&partnerID=8YFLogxK

[64] Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, Keith MayesAttacking smart card systems: Theory and practice‘, Information Security Technical Report, vol. 14, pp. 46-56. http://portal.acm.org/citation.cfm?id=1595066.1595100

[63] G.P. Hancke, K.E. Mayes, K. MarkantonakisConfidence in smart token proximity: Relay attacks revisited‘, Computers and Security, vol. 28, no. 7, pp. 615 – 627. http://www.sciencedirect.com/science/article/pii/S0167404809000595

[62] Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Location Based Application Availability. in R Meersman, P Herrero & T Dillon (eds), On the Move to Meaningful Internet Systems: OTM Workshops. vol. /, LNCS, Springer, Vilamoura, Portugal, pp. 128 – 138. https://doi.org/10.1007/978-3-642-05290-3

[61] Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. in ICITST’09. pp. 1-8.

[60] Xuefei Leng, Yuanhung Lien, Keith Mayes, Konstantinos Markantonakis, Jung-Hui Chiu Select Response Grouping Proof for RFID Tags. in Proceedings of the First Asian Conference on Intelligent Information and Database Systems. IEEE Computer Society Press, Washington, DC, USA, pp. 73-77. http://portal.acm.org/citation.cfm?id=1578014.1578047

[59] Michael Tunstall, Kostas Markantonakis, Damien Sauveron, Keith Mayes Smart Cards. in H Bidgoli (ed.), Handbook of Technology Management. John Wiley & Sons.

[58] Keith E. Mayes, Konstantinos Markantonakis, Gerhard Hancke ‘Transport ticketing security and fraud controls‘, Information Security Technical Report, vol. 14, no. 2, pp. 87-95. http://www.sciencedirect.com/science/article/pii/S1363412709000193

[57] Ioannis G. Askoxylakis, Damien Sauveron, Konstantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. in Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies. IEEE Computer Society Press, Washington, DC, USA, pp. 193-202. http://portal.acm.org/citation.cfm?id=1447563.1447917

[56] Lishoy Francis, Keith Mayes, Konstantinos Markantonakis An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems. in THIRD INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. IEEE COMPUTER SOC, LOS ALAMITOS, pp. 386-395.

[55] Wael William Malek, Keith Mayes, Kostas Markantonakis Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. in Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. CARDIS ’08, Springer-Verlag, Berlin, Heidelberg, pp. 118-132. http://dx.doi.org/10.1007/978-3-540-85893-5_9

[54] Xuefei Leng, Keith Mayes, Konstantinos MarkantonakisHB-MP+ Protocol: An Improvement on the HB-MP Protocol‘, IEEE International Conference on RFID — IEEE RFID , pp. 118-124.

[53] Jose A. Onieva (Editor), Sauveron D. (Editor), Chaumette S. (Editor), Gollmann D. (Editor), Konstantinos Markantonakis (Editor) ‘Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks‘.

[52] Jose A. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, Konstantinos MarkantonakisInformation Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks‘.

[51] Keith Mayes, Kostas Markantonakis, Carlos Cid Mifare Classic Security Issues A System Perspective: Smart card Technology International, A Global Journal of Advanced Chip Technology. Smart Card Technology International.

[50] Keith E. Mayes, Konstantinos MarkantonakisMobile communication security controllers an evaluation paper‘, Information Security Technical Report, vol. 13, pp. 173-192. http://portal.acm.org/citation.cfm?id=1460943.1461299

[49] Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Ioannis G. Askoxylakis Overview of Security Threats for Smart Cards in the Public Transport Industry. in Proceedings of the IEEE International Conference on e-Business Engineering. IEEE Computer Society Press, Washington, DC, USA, pp. 506-513. http://portal.acm.org/citation.cfm?id=1471605.1472155

[48] Kevin Eagles, Konstantinos Markantonakis, Keith Mayes A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies. in Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. WISTP’07, Springer-Verlag, Berlin, Heidelberg, pp. 161-174. <http://portal.acm.org/citation.cfm?id=1763190.1763209

[47] Qing Zhang, Kostas Markantonakis, Keith Mayes A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. in A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. Springer-Verlag, China, The 3rd International SKLOIS Conference on Information Security and Cryptology (Inscrypt), Xining, China, 1/09/07.

[46] Konstantinos Markantonakis, Keith MayesProblems and prospects of multi application smart cards in the UK financial industry‘, Icebe : ieee international conference on e-Business engineering, proceedings, pp. 447-452.

[45] Kostas Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron Smart Cards: Communication Protocols and Applications. in Smart Cards: Communication Protocols and Applications.

[44] Kostas Markantonakis, Keith Mayes, Michael Tunstall, Damien Sauveron Smart card Security. in N Nadia, C Leandro dos Santos & M Luiza de Macedo (eds), Mobile Robots: The Evolutionary Approach. vol. 50, Studies in Computational Intelligence, vol. 50, pp. 205.

[43] Kostas Markantonakis, Fred Piper, Keith Mayes Smart Cards for Security and Assurance. in Managing Information Assurance in Financial Services. Information Science Publishing.

[42] Keith Mayes, Kostas Markantonakis The Evolution of Mobile Security: The Silicon Trust Report. The Silicon Trust.

[41] Keith Mayes, Kostas Markantonakis Will smart cards outsmart the criminals?. The Times Newspaper.

[40] Damien Sauveron (Editor), Konstantinos Markantonakis (Editor), Angelos Bilas (Editor), Jean-Jacques Quisquater (Editor) ‘WISTP’07: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems‘.

[39] Keith Mayes, Kostas Markantonakis, William G. Sirett A behavioural approach to smart card application monitoring: Smart Card Technology International, The Global Journal of Advanced Card Technology. Smart Card Technology International.

[38] Q. Zhang, Kostas Markantonakis, K. MayesA Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol‘, E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on, vol. 0, pp. 20. https://doi.org/http://doi.ieeecomputersociety.org/10.1109/CEC-EEE.2006.6

[37] Q. Zhang, Kostas Markantonakis, K. Mayes A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery. in Proceedings of the IEEE International Conference on Computer Systems and Applications. IEEE Computer Society Press, Washington, DC, USA, pp. 851-858. http://dl.acm.org/citation.cfm?id=1317529.1317666

[36] William G. Sirett, John A. MacDonald, Keith Mayes, Kostas Markantonakis Design, Installation and Execution of a Security Agent for Mobile Stations. in J Domingo-Ferrer, J Posegga & D Schreckling (eds), CARDIS. vol. , Lecture Notes in Computer Science, Springer, pp. 1-15. <http://dblp.uni-trier.de/db/conf/cardis/cardis2006.html#SirettMMM06

[35] William G. Sirett, Kostas Markantonakis, Keith MayesImplementation of Temporally Aware Behaviour-Based Security in Smart Cards‘, Paper presented at 1st International Workshop on Secure Information Systems (SIS ’06), Poland, 1/11/06.

[34] Michael Tunstall, Konstantinos Markantonakis, Keith Mayes Inhibiting Card Sharing Attacks. in H Yoshiura, K Sakurai, K Rannenberg, Y Murayama & S Kawamura (eds), Advances in Information and Computer Security. vol. , Lecture Notes in Computer Science, Springer Berlin / Heidelberg, pp. 239-251. <http://dx.doi.org/10.1007/11908739_17

[33] Keith E. Mayes, Konstantinos MarkantonakisOn the potential of high density smart cards‘, Information Security Technical Report, vol. 11, no. 3, pp. 147 – 153. http://www.sciencedirect.com/science/article/pii/S136341270600032X

[32] William G. Sirett, John A. Macdonald, Keith Mayes, Kostas Markantonakis Secure Deployment of Applications to Fielded Devices and Smart Cards. in Security in Information Systems. pp. 195-206.

[31] Damien Sauveron, Pierre Dusart, Armelle Trotin, Kostas Markantonakis, Keith Mayes Security Evaluation and Certification Process. in N Nedjah, A Abraham & M Luiza de Macedo (eds), Computational Intelligence in Information Assurance and Security. Springer-Verlag.

[30] Kostas Markantonakis, Michael Tunstall, Keith MayesSecurity of Open Satellite TV Receivers‘, Paper presented at 7th Edition of e-smart conference and demos, Sophia Antipolis, French Riviera, France, 20/09/06 – 22/09/06.

[29] Keith Mayes, Kostas Markantonakis, Calvin Chen Smart card Platform-Fingerprinting: Smart Card Technology International. in M Locke (ed.), Smart Card Technology International: The Global Journal of Advanced Card Technology. Smart Card Technology International, pp. 78.

[28] Kostas Markantonakis, Keith Mayes, Fred Piper, Michael Tunstall Smart card Security. in N Nedjah, A Abraham & M Luiza de Macedo (eds), Computational Intelligence in Information Assurance and Security. Springer-Verlag.

[27] William G. Sirett, Konstantinos Markantonakis, Keith Mayes Temporally Aware Behaviour-Based Security in Smart Cards. in Computational Intelligence and Security, International Conference on. vol. 1, pp. 604 -608. https://doi.org/10.1109/ICCIAS.2006.294206

[26] Serge Chaumette, Kostas Markantonakis, Keith Mayes, Damien Sauveron ‘The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos‘, Paper presented at 7th Edition of e-smart conference and demos, Sophia Antipolis, French Riviera, France, 20/09/06 – 22/09/06.

[25] Qing Zhang, Keith Mayes, Kostas Markantonakis A Fair Biometric Enabled M-Payment Solution with Anonymity Support. in A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag, Workshop on Information Security Applications, Jeju, Korea, Republic of, 1/08/04.

[24] Q. Zhang, K. Mayes, Konstantinos Markantonakis A user-centric m-payment solution. in Mobile Technology, Applications and Systems, 2nd International Conference on. pp. 8. https://doi.org/10.1109/MTAS.2005.207134

[23] Lishoy Francis, William G. Sirett, Keith Mayes, Konstantinos MarkantonakisCountermeasures for attacks on satellite TV cards using open receivers‘, Paper presented at Third Australasian Information Security Workshop, Newcastle, Australia, 1/01/05 – 2/05/05 pp. 153–158. <http://portal.acm.org/citation.cfm?id=1082290.1082311

[22] K. Papapanagiotou, Kostas Markantonakis, Q. Zhang, W. Sirett, K. Mayes On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. in R Sasaki, S Qing, E Okamoto & H Yoshiura (eds), Security and Privacy in the Age of Ubiquitous Computing. vol. 181, IFIP Advances in Information and Communication Technology, Springer Boston, pp. 551-563. <http://dx.doi.org/10.1007/0-387-25660-1_36

[21] Konstantinos Markantonakis, Keith Mayes, Piper Fred ‘Smart card based authentication – any future?‘, Computers and Security, vol. 24, no. 3, pp. 188-191.

[20] Konstantinos Rantos, Kostas Markantonakis An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. in SEC’04. pp. 351-366.

[19] Konstantinos Markantonakis, Keith Mayes A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY. in Eight IFIP TC-6-11 Conference on Communications and Multimedia Security. Kluwer Academic Publishers.

[18] Keith Mayes, Mohammed Al Hussein, Kostas Markantonakis Increasing Awareness of Smart card System Security Issues: Smart Card Technology International Journal. in M Locke (ed.), Smart Card Technology International Journal. Smart Card Technology International.

[17] Kostas Markantonakis, Keith Mayes Smart Card Technology in the Public Transport Industry: Secure Magazine – The Silicon Trust Report. in Secure Magazine – The Silicon Trust Report. 1 edn, The Silicon Trust, pp. 26.

[16] Qing Zhang, Joao Nobrega Brites Moita, Keith Mayes, Kostas Markantonakis The Secure and Multiple Payment System based on the Mobile Phone Platform. in The Secure and Multiple Payment System based on the Mobile Phone Platform. Workshop on Information Security Applications, Jeju, Korea, Republic of, 1/08/04.

[15] Konstantinos Markantonakis, Keith MayesAn overview of the GlobalPlatform smart card specification‘, Information Security Technical Report, vol. 8, no. 1, pp. 17 – 29. http://www.sciencedirect.com/science/article/pii/S1363412703001031

[14] Keith Mayes, Konstantinos MarkantonakisAre we smart about security?‘, Information Security Technical Report, vol. 8, no. 1, pp. 6 – 16. http://www.sciencedirect.com/science/article/pii/S136341270300102X

[13] Keith Mayes, Kostas Markantonakis Smart Cards: Enabling e-Government: The Global Journal of Advanced Card Technology, Smart Card Technology International..

[12] Keith Mayes, Kostas Markantonakis The Smart Card Centre at Royal Holloway University of London: Secure – the Silicon Trust Report. The Silicon Trust.

[11] Konstantinos Markantonakis Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? in Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. IFIP/Sec ’01, Kluwer, B.V., pp. 77-92.

[10] Konstantinos Markantonakis Secure Log File Download Mechanisms for Smart Cards. in Proceedings of the The International Conference on Smart Card Research and Applications. Springer-Verlag, London, UK, pp. 285-304. <http://dl.acm.org/citation.cfm?id=646692.703447

[9] Konstantinos Markantonakis An Architecture for Audit Logging in a Smart Card Environment. in An Architecture for Audit Logging in a Smart Card Environment. E-Commerce and New Media: Managing Safety, Security and Malware Challenges Effectively, AALBORG, Denmark, 27/02/99.

[8] Konstantinos Markantonakis Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. in Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, pp. 230-243.

[7] Konstantinos Markantonakis, Simeon Xenitellis Implementing a Secure Log File Download Manager for the Java Card. in Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. CMS ’99, Kluwer, B.V., pp. 143-162.

[6] Konstantinos MarkantonakisInformation security technical report – prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)‘, Information Security Technical Report, vol. 4, pp. 7-8. http://dx.doi.org/10.1016/S1363-4127(99)80025-9

[5] Konstantinos Markantonakis Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework). in Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 edn, vol. 4, Elsevier, pp. 69.

[4] Konstantinos Markantonakis, Konstantinos Rantos On the Life Cycle of the Certification Authority key pairs in EMV’96. in On the Life Cycle of the Certification Authority key pairs in EMV’96. Society for Computer Simulation, pp. 125-130, EUROMEDIA 99, Munich, Germany, 25/04/99.

[3] Konstantinos MarkantonakisJava card technology and security‘, Information Security Technical Report, vol. 3, no. 2, pp. 82 – 89.

[2] Konstantinos Markantonakis Secure Log File Download Mechanisms for Smart Cards. in CARDIS’98. pp. 285-304.

[1] Konstantinos Markantonakis The Case for a Secure Multi-Application Smart Card Operating System. in Proceedings of the First International Workshop on Information Security. ISW ’97, Springer-Verlag, London, UK, pp. 188-197. <http://dl.acm.org/citation.cfm?id=648022.744180