Practical NFC peer-to-peer relay attack using mobile phones L Francis, G Hancke, K Mayes, K Markantonakis Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 295 | 2010 |
Smart cards, tokens, security and applications KE Mayes, K Markantonakis Springer, 2008 | 280 | 2008 |
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy FS Hardwick, A Gioulis, RN Akram, K Markantonakis 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 249 | 2018 |
Practical relay attack on contactless transactions by using NFC mobile phones L Francis, G Hancke, K Mayes, K Markantonakis Radio Frequency Identification System Security, 21-32, 2012 | 168 | 2012 |
Confidence in smart token proximity: Relay attacks revisited GP Hancke, KE Mayes, K Markantonakis Computers & Security 28 (7), 615-627, 2009 | 156 | 2009 |
Security challenges for user-oriented RFID applications within the" Internet of things" GP Hancke, K Markantonakis, KE Mayes Journal of Internet Technology 11 (3), 307-313, 2010 | 103 | 2010 |
HB-MP+ Protocol: An Improvement on the HB-MP Protocol X Leng, K Mayes, K Markantonakis 2008 IEEE international conference on RFID, 118-124, 2008 | 102 | 2008 |
Security, privacy and safety evaluation of dynamic and static fleets of drones RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ... 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017 | 98 | 2017 |
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ... 2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016 | 98 | 2016 |
Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 82 | 2009 |
A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks B Semal, K Markantonakis, RN Akram 2018 IEEE/AIAA 37th digital avionics systems conference (DASC), 1-8, 2018 | 76 | 2018 |
Log your car: The non-invasive vehicle forensics H Mansor, K Markantonakis, RN Akram, K Mayes, I Gurulian 2016 IEEE Trustcom/BigDataSE/ISPA, 974-982, 2016 | 65 | 2016 |
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms L Francis, G Hancke, K Mayes, K Markantonakis 2009 International Conference for Internet Technology and Secured …, 2009 | 63 | 2009 |
Precise instruction-level side channel profiling of embedded processors M Msgna, K Markantonakis, K Mayes Information Security Practice and Experience: 10th International Conference …, 2014 | 57 | 2014 |
Fair and transparent blockchain based tendering framework-a step towards open governance FS Hardwick, RN Akram, K Markantonakis 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 56 | 2018 |
A paradigm shift in smart card ownership model RN Akram, K Markantonakis, K Mayes 2010 International Conference on Computational Science and Its Applications …, 2010 | 50 | 2010 |
Secure improved cloud-based RFID authentication protocol S Abughazalah, K Markantonakis, K Mayes International Workshop on Data Privacy Management, 147-164, 2014 | 44 | 2014 |
Philanthropy on the Blockchain D Jayasinghe, S Cobourne, K Markantonakis, RN Akram, K Mayes Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 43 | 2018 |
Establishing mutually trusted channels for remote sensing devices with trusted execution environments C Shepherd, RN Akram, K Markantonakis Proceedings of the 12th International Conference on Availability …, 2017 | 43 | 2017 |
Errata to: Secure smart embedded devices, platforms and applications K Markantonakis, K Mayes Secure Smart Embedded Devices, Platforms and Applications, E3-E14, 2014 | 41 | 2014 |