Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Raja Naeem Akram
@article{DBLP:journals/corr/abs-2103-08229, author = {Georges{-}Axel Jaloyan and Konstantinos Markantonakis and Raja Naeem Akram and David Robin and Keith Mayes and David Naccache}, title = {Return-Oriented Programming on {RISC-V}}, journal = {CoRR}, volume = {abs/2103.08229}, year = {2021}, url = {https://arxiv.org/abs/2103.08229}, eprinttype = {arXiv}, eprint = {2103.08229}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08229.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SemalMAK20, author = {Benjamin Semal and Konstantinos Markantonakis and Raja Naeem Akram and Jan Kalbantner}, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, pages = {360--377}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0\_20}, doi = {10.1007/978-3-030-61638-0\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SemalMAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JaloyanMARMN20, author = {Georges{-}Axel Jaloyan and Konstantinos Markantonakis and Raja Naeem Akram and David Robin and Keith Mayes and David Naccache}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Return-Oriented Programming on {RISC-V}}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {471--480}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384738}, doi = {10.1145/3320269.3384738}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JaloyanMARMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SemalMAK20, author = {Benjamin Semal and Konstantinos Markantonakis and Raja Naeem Akram and Jan Kalbantner}, editor = {Marko H{\"{o}}lbl and Kai Rannenberg and Tatjana Welzer}, title = {Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems}, booktitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {580}, pages = {3--16}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58201-2\_1}, doi = {10.1007/978-3-030-58201-2\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SemalMAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HeckmannMMAN19, author = {Thibaut Heckmann and James P. McEvoy and Konstantinos Markantonakis and Raja Naeem Akram and David Naccache}, title = {Removing epoxy underfill between neighbouring components using acid for component chip-off}, journal = {Digit. Investig.}, volume = {29}, pages = {198--209}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.003}, doi = {10.1016/J.DIIN.2019.04.003}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LeeMA19, author = {Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram}, title = {Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {18}, number = {3}, pages = {26:1--26:21}, year = {2019}, url = {https://doi.org/10.1145/3284361}, doi = {10.1145/3284361}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/LeeMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NguyenAMLW19, author = {Khuong An Nguyen and Raja Naeem Akram and Konstantinos Markantonakis and Zhiyuan Luo and Chris Watkins}, title = {Location Tracking Using Smartphone Accelerometer and Magnetometer Traces}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {96:1--96:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3340518}, doi = {10.1145/3339252.3340518}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NguyenAMLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AkramCLSY18, author = {Raja Naeem Akram and Hsiao{-}Hwa Chen and Javier L{\'{o}}pez and Damien Sauveron and Laurence T. Yang}, title = {Security, privacy and trust of user-centric solutions}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {417--420}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.11.026}, doi = {10.1016/J.FUTURE.2017.11.026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/AkramCLSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/TapsellAM18, author = {James Tapsell and Raja Naeem Akram and Konstantinos Markantonakis}, title = {An Evaluation of the Security of the Bitcoin Peer-To-Peer Network}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1057--1062}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00195}, doi = {10.1109/CYBERMATICS\_2018.2018.00195}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/TapsellAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/HardwickGAM18, author = {Freya Sheer Hardwick and Apostolos Gioulis and Raja Naeem Akram and Konstantinos Markantonakis}, title = {E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy}, booktitle = {{IEEE} International Conference on Internet of Things (iThings) and {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber, Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018}, pages = {1561--1567}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/Cybermatics\_2018.2018.00262}, doi = {10.1109/CYBERMATICS\_2018.2018.00262}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ithings/HardwickGAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GurulianMFA18, author = {Iakovos Gurulian and Konstantinos Markantonakis and Eibe Frank and Raja Naeem Akram}, title = {Good Vibrations: Artificial Ambience-Based Relay Attack Detection}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {481--489}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00075}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GurulianMFA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/HardwickAM18, author = {Freya Sheer Hardwick and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Fair and Transparent Blockchain Based Tendering Framework - {A} Step Towards Open Governance}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1342--1347}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00185}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/HardwickAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TapsellAM18, author = {James Tapsell and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Consumer Centric Data Control, Tracking and Transparency - {A} Position Paper}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1380--1385}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00191}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00191}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/TapsellAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/MeisterAM18, author = {Julia A. Meister and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Deep Learning Application in Security and Privacy - Theory and Practice: {A} Position Paper}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {129--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_10}, doi = {10.1007/978-3-030-20074-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/MeisterAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ShepherdAM18, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Olivier Blazy and Chan Yeob Yeun}, title = {Remote Credential Management with Mutual Attestation for Trusted Execution Environments}, booktitle = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11469}, pages = {157--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-20074-9\_12}, doi = {10.1007/978-3-030-20074-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ShepherdAM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-10707, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs}, journal = {CoRR}, volume = {abs/1804.10707}, year = {2018}, url = {http://arxiv.org/abs/1804.10707}, eprinttype = {arXiv}, eprint = {1804.10707}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-10707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-04747, author = {James Tapsell and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Consumer Centric Data Control, Tracking and Transparency - {A} Position Paper}, journal = {CoRR}, volume = {abs/1805.04747}, year = {2018}, url = {http://arxiv.org/abs/1805.04747}, eprinttype = {arXiv}, eprint = {1805.04747}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-04747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05844, author = {Freya Sheer Hardwick and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Fair and Transparent Blockchain based Tendering Framework - {A} Step Towards Open Governance}, journal = {CoRR}, volume = {abs/1805.05844}, year = {2018}, url = {http://arxiv.org/abs/1805.05844}, eprinttype = {arXiv}, eprint = {1805.05844}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-10258, author = {Freya Sheer Hardwick and Raja Naeem Akram and Konstantinos Markantonakis}, title = {E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy}, journal = {CoRR}, volume = {abs/1805.10258}, year = {2018}, url = {http://arxiv.org/abs/1805.10258}, eprinttype = {arXiv}, eprint = {1805.10258}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-10258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-10259, author = {James Tapsell and Raja Naeem Akram and Konstantinos Markantonakis}, title = {An evaluation of the security of the Bitcoin Peer-to- Peer Network}, journal = {CoRR}, volume = {abs/1805.10259}, year = {2018}, url = {http://arxiv.org/abs/1805.10259}, eprinttype = {arXiv}, eprint = {1805.10259}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-10259.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-00190, author = {Julia A. Meister and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Deep Learning Application in Security and Privacy - Theory and Practice: {A} Position Paper}, journal = {CoRR}, volume = {abs/1812.00190}, year = {2018}, url = {http://arxiv.org/abs/1812.00190}, eprinttype = {arXiv}, eprint = {1812.00190}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-00190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GurulianMAM17, author = {Iakovos Gurulian and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, title = {Artificial Ambient Environments for Proximity Critical Applications}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {5:1--5:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098964}, doi = {10.1145/3098954.3098964}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/GurulianMAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ShepherdAM17, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, title = {Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {7:1--7:10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098971}, doi = {10.1145/3098954.3098971}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ShepherdAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LeeMA17, author = {Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram}, title = {Provisioning Software with Hardware-Software Binding}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {49:1--49:9}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3103158}, doi = {10.1145/3098954.3103158}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/LeeMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/Gurulian0MA17, author = {Iakovos Gurulian and Gerhard P. Hancke and Konstantinos Markantonakis and Raja Naeem Akram}, editor = {Thomas Eisenbarth and Yannick Teglia}, title = {May the Force Be with You: Force-Based Relay Attack Detection}, booktitle = {Smart Card Research and Advanced Applications - 16th International Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10728}, pages = {142--159}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75208-2\_9}, doi = {10.1007/978-3-319-75208-2\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/Gurulian0MA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HakenMGSA17, author = {Gareth Haken and Konstantinos Markantonakis and Iakovos Gurulian and Carlton Shepherd and Raja Naeem Akram}, editor = {Jianying Zhou and Ernesto Damiani}, title = {Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017}, pages = {21--32}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055186.3055201}, doi = {10.1145/3055186.3055201}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HakenMGSA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ShepherdAM17, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {Towards trusted execution of multi-modal continuous authentication schemes}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {1444--1451}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019652}, doi = {10.1145/3019612.3019652}, timestamp = {Wed, 01 Feb 2023 17:58:48 +0100}, biburl = {https://dblp.org/rec/conf/sac/ShepherdAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/GurulianAMM17, author = {Iakovos Gurulian and Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Ahmed Seffah and Birgit Penzenstadler and Carina Alves and Xin Peng}, title = {Preventing relay attacks in mobile transactions using infrared light}, booktitle = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech, Morocco, April 3-7, 2017}, pages = {1724--1731}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3019612.3019794}, doi = {10.1145/3019612.3019794}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/GurulianAMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/GurulianMSFA17, author = {Iakovos Gurulian and Konstantinos Markantonakis and Carlton Shepherd and Eibe Frank and Raja Naeem Akram}, editor = {Pooya Farshim and Emil Simion}, title = {Proximity Assurances Based on Natural and Artificial Ambient Environments}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10543}, pages = {83--103}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69284-5\_7}, doi = {10.1007/978-3-319-69284-5\_7}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/GurulianMSFA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShepherdGFMAPM17, author = {Carlton Shepherd and Iakovos Gurulian and Eibe Frank and Konstantinos Markantonakis and Raja Naeem Akram and Emmanouil Panaousis and Keith Mayes}, title = {The Applicability of Ambient Sensors as Proximity Evidence for {NFC} Transactions}, booktitle = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San Jose, CA, USA, May 25, 2017}, pages = {179--188}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SPW.2017.29}, doi = {10.1109/SPW.2017.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ShepherdGFMAPM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/ShepherdPAM17, author = {Carlton Shepherd and Fabien A. P. Petitcolas and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Javier L{\'{o}}pez and Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis}, title = {An Exploratory Analysis of the Security Risks of the Internet of Things in Finance}, booktitle = {Trust, Privacy and Security in Digital Business - 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10442}, pages = {164--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64483-7\_11}, doi = {10.1007/978-3-319-64483-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/ShepherdPAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GurulianSFMAM17, author = {Iakovos Gurulian and Carlton Shepherd and Eibe Frank and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, title = {On the Effectiveness of Ambient Sensing for Detecting {NFC} Relay Attacks}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {41--49}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GurulianSFMAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AkramMMBCSC17, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes and Pierre{-}Fran{\c{c}}ois Bonnefoi and Amina Cherif and Damien Sauveron and Serge Chaumette}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {A Secure and Trusted Channel Protocol for UAVs Fleets}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {3--24}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_1}, doi = {10.1007/978-3-319-93524-9\_1}, timestamp = {Fri, 09 Apr 2021 18:48:54 +0200}, biburl = {https://dblp.org/rec/conf/wistp/AkramMMBCSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/JayasingheCMAM17, author = {Danushka Jayasinghe and Sheila Cobourne and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {Philanthropy on the Blockchain}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {25--38}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_2}, doi = {10.1007/978-3-319-93524-9\_2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/JayasingheCMAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/ShepherdAM17, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Gerhard P. Hancke and Ernesto Damiani}, title = {EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs}, booktitle = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10741}, pages = {75--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93524-9\_5}, doi = {10.1007/978-3-319-93524-9\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/ShepherdAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/MarkantonakisA17, author = {Konstantinos Markantonakis and Raja Naeem Akram}, editor = {Keith Mayes and Konstantinos Markantonakis}, title = {Multi-Application Smart Card Platforms and Operating Systems}, booktitle = {Smart Cards, Tokens, Security and Applications, Second Edition}, pages = {59--92}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-50500-8\_3}, doi = {10.1007/978-3-319-50500-8\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/MarkantonakisA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/WaiteMA17, author = {Gary Waite and Keith Mayes and Raja Naeem Akram}, editor = {Keith Mayes and Konstantinos Markantonakis}, title = {Application Development Environments for Java and {SIM} Toolkit}, booktitle = {Smart Cards, Tokens, Security and Applications, Second Edition}, pages = {253--281}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-50500-8\_10}, doi = {10.1007/978-3-319-50500-8\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/WaiteMA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/SauveronAM17, author = {Damien Sauveron and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Keith Mayes and Konstantinos Markantonakis}, title = {Smart Card Reader and Mobile APIs}, booktitle = {Smart Cards, Tokens, Security and Applications, Second Edition}, pages = {305--349}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-50500-8\_12}, doi = {10.1007/978-3-319-50500-8\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/SauveronAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05417, author = {Collins Mtita and Maryline Laurent and Damien Sauveron and Raja Naeem Akram and Konstantinos Markantonakis and Serge Chaumette}, title = {Serverless Protocols for Inventory and Tracking with a {UAV}}, journal = {CoRR}, volume = {abs/1708.05417}, year = {2017}, url = {http://arxiv.org/abs/1708.05417}, eprinttype = {arXiv}, eprint = {1708.05417}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-05732, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes and Oussama Habachi and Damien Sauveron and Andreas Steyven and Serge Chaumette}, title = {Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones}, journal = {CoRR}, volume = {abs/1708.05732}, year = {2017}, url = {http://arxiv.org/abs/1708.05732}, eprinttype = {arXiv}, eprint = {1708.05732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-05732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-03943, author = {Carlton Shepherd and Raja Naeem Akram and Konstantinos Markantonakis}, title = {EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs}, journal = {CoRR}, volume = {abs/1712.03943}, year = {2017}, url = {http://arxiv.org/abs/1712.03943}, eprinttype = {arXiv}, eprint = {1712.03943}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-03943.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/AkramMS16, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron}, title = {Recovering from a lost digital wallet: {A} smart cards perspective extended abstract}, journal = {Pervasive Mob. Comput.}, volume = {29}, pages = {113--129}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2015.06.018}, doi = {10.1016/J.PMCJ.2015.06.018}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/AkramMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/MsgnaFAM16, author = {Mehari G. Msgna and Houda Ferradi and Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Peter Y. A. Ryan and David Naccache and Jean{-}Jacques Quisquater}, title = {Secure Application Execution in Mobile Devices}, booktitle = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9100}, pages = {417--438}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49301-4\_26}, doi = {10.1007/978-3-662-49301-4\_26}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/MsgnaFAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeeMA16, author = {Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram}, editor = {Jianying Zhou and Javier L{\'{o}}pez}, title = {Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting}, booktitle = {Proceedings of the 2nd {ACM} International Workshop on Cyber-Physical System Security, CPSS@AsiaCCS, Xi'an, China, May 30, 2016}, pages = {70--81}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2899015.2899029}, doi = {10.1145/2899015.2899029}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeeMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MansorMAMG16, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes and Iakovos Gurulian}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {Log Your Car: Reliable Maintenance Services Record}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {484--504}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_30}, doi = {10.1007/978-3-319-54705-3\_30}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MansorMAMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/HassanMA16, author = {Rashedul Hassan and Konstantinos Markantonakis and Raja Naeem Akram}, editor = {Jingzhi Guo and Hongming Cai and Xiang Fei and Kuo{-}Ming Chao and Jen{-}Yao Chung}, title = {Can You Call the Software in Your Device be Firmware?}, booktitle = {13th {IEEE} International Conference on e-Business Engineering, {ICEBE} 2016, Macau, China, November 4-6, 2016}, pages = {188--195}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICEBE.2016.040}, doi = {10.1109/ICEBE.2016.040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/HassanMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/JayasingheMAM16, author = {Danushka Jayasinghe and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, editor = {Gerhard P. Hancke and Konstantinos Markantonakis}, title = {Enhancing {EMV} Tokenisation with Dynamic Transaction Tokens}, booktitle = {Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10155}, pages = {107--122}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-62024-4\_8}, doi = {10.1007/978-3-319-62024-4\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/JayasingheMAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16, author = {Carlton Shepherd and Ghada Arfaoui and Iakovos Gurulian and Robert P. Lee and Konstantinos Markantonakis and Raja Naeem Akram and Damien Sauveron and Emmanuel Conchon}, title = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical Review in the Context of the Internet of Things and Cyber-Physical Systems}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {168--177}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0060}, doi = {10.1109/TRUSTCOM.2016.0060}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16, author = {Danushka Jayasinghe and Konstantinos Markantonakis and Iakovos Gurulian and Raja Naeem Akram and Keith Mayes}, title = {Extending {EMV} Tokenised Payments to Offline-Environments}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {443--450}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0095}, doi = {10.1109/TRUSTCOM.2016.0095}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramBCMS16, author = {Raja Naeem Akram and Pierre{-}Fran{\c{c}}ois Bonnefoi and Serge Chaumette and Konstantinos Markantonakis and Damien Sauveron}, title = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {606--614}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0116}, doi = {10.1109/TRUSTCOM.2016.0116}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/MansorMAMG16, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes and Iakovos Gurulian}, title = {Log Your Car: The Non-invasive Vehicle Forensics}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {974--982}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0164}, doi = {10.1109/TRUSTCOM.2016.0164}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AkramGSMM16, author = {Raja Naeem Akram and Iakovos Gurulian and Carlton Shepherd and Konstantinos Markantonakis and Keith Mayes}, title = {Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments}, journal = {CoRR}, volume = {abs/1601.07101}, year = {2016}, url = {http://arxiv.org/abs/1601.07101}, eprinttype = {arXiv}, eprint = {1601.07101}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AkramGSMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GurulianSMAM16, author = {Iakovos Gurulian and Carlton Shepherd and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, title = {When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data}, journal = {CoRR}, volume = {abs/1605.00425}, year = {2016}, url = {http://arxiv.org/abs/1605.00425}, eprinttype = {arXiv}, eprint = {1605.00425}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GurulianSMAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AkramM16, author = {Raja Naeem Akram and Konstantinos Markantonakis}, title = {Challenges of Security and Trust of Mobile Devices as Digital Avionics Component}, journal = {CoRR}, volume = {abs/1605.00446}, year = {2016}, url = {http://arxiv.org/abs/1605.00446}, eprinttype = {arXiv}, eprint = {1605.00446}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AkramM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AkramMMBSC16, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes and Pierre{-}Fran{\c{c}}ois Bonnefoi and Damien Sauveron and Serge Chaumette}, title = {Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks}, journal = {CoRR}, volume = {abs/1608.04115}, year = {2016}, url = {http://arxiv.org/abs/1608.04115}, eprinttype = {arXiv}, eprint = {1608.04115}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AkramMMBSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AkramMMBSC16a, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes and Pierre{-}Fran{\c{c}}ois Bonnefoi and Damien Sauveron and Serge Chaumette}, title = {An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks}, journal = {CoRR}, volume = {abs/1608.04116}, year = {2016}, url = {http://arxiv.org/abs/1608.04116}, eprinttype = {arXiv}, eprint = {1608.04116}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AkramMMBSC16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/AkramMS15, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron}, title = {A novel consumer-centric card management architecture and potential security issues}, journal = {Inf. Sci.}, volume = {321}, pages = {150--161}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2014.12.049}, doi = {10.1016/J.INS.2014.12.049}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/AkramMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/MansorMAM15, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, title = {Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {139--148}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.58}, doi = {10.1109/ARES.2015.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/MansorMAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AkramMM15, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {541--560}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_27}, doi = {10.1007/978-3-319-24177-7\_27}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AkramMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MansorMAM15, author = {Hafizah Mansor and Konstantinos Markantonakis and Raja Naeem Akram and Keith Mayes}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Let's Get Mobile: Secure {FOTA} for Automotive System}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {503--510}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_38}, doi = {10.1007/978-3-319-25645-0\_38}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/MansorMAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/MarkantonakisAM15, author = {Konstantinos Markantonakis and Raja Naeem Akram and Mehari G. Msgna}, editor = {Ion Bica and David Naccache and Emil Simion}, title = {Secure and Trusted Application Execution on Embedded Devices}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 8th International Conference, {SECITC} 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9522}, pages = {3--24}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27179-8\_1}, doi = {10.1007/978-3-319-27179-8\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/MarkantonakisAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMSM15, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron and Keith Mayes}, title = {Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {483--490}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.410}, doi = {10.1109/TRUSTCOM.2015.410}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/BonnefoiDSAM15, author = {Pierre{-}Fran{\c{c}}ois Bonnefoi and Pierre Dusart and Damien Sauveron and Raja Naeem Akram and Konstantinos Markantonakis}, title = {A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost {RFID} Tags}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {612--620}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.426}, doi = {10.1109/TRUSTCOM.2015.426}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/BonnefoiDSAM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JayasingheAMRM15, author = {Danushka Jayasinghe and Raja Naeem Akram and Konstantinos Markantonakis and Konstantinos Rantos and Keith Mayes}, title = {Enhancing {EMV} Online {PIN} Verification}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {808--817}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.451}, doi = {10.1109/TRUSTCOM.2015.451}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/JayasingheAMRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2015, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3}, doi = {10.1007/978-3-319-24018-3}, isbn = {978-3-319-24017-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/AkramM14, author = {Raja Naeem Akram and Konstantinos Markantonakis}, editor = {Theo Tryfonas and Ioannis G. Askoxylakis}, title = {Rethinking the Smart Card Technology}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - Second International Conference, {HAS} 2014, Held as Part of {HCI} International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8533}, pages = {221--232}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07620-1\_20}, doi = {10.1007/978-3-319-07620-1\_20}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/hci/AkramM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AkramKL14, author = {Raja Naeem Akram and Ryan K. L. Ko and Tsz Fung Law}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {Consumer-centric protection for online social networks}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051872}, doi = {10.1109/IRI.2014.7051872}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/AkramKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/AkramMM14, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Mohamad Badra and Omar Alfandi}, title = {Trusted Platform Module for Smart Cards}, booktitle = {6th International Conference on New Technologies, Mobility and Security, {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}, pages = {1--5}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/NTMS.2014.6814058}, doi = {10.1109/NTMS.2014.6814058}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ntms/AkramMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMS14, author = {Raja Naeem Akram and Konstantinos Markantonakis and Damien Sauveron}, title = {Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {448--456}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.57}, doi = {10.1109/TRUSTCOM.2014.57}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramK14, author = {Raja Naeem Akram and Ryan K. L. Ko}, title = {Unified Model for Data Security - {A} Position Paper}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {831--839}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.110}, doi = {10.1109/TRUSTCOM.2014.110}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramK14a, author = {Raja Naeem Akram and Ryan K. L. Ko}, title = {Digital Trust - Trusted Computing and Beyond: {A} Position Paper}, booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014}, pages = {884--892}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/TrustCom.2014.116}, doi = {10.1109/TRUSTCOM.2014.116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramK14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/AkramK14, author = {Raja Naeem Akram and Ryan K. L. Ko}, editor = {David Naccache and Damien Sauveron}, title = {End-to-End Secure and Privacy Preserving Mobile Chat Application}, booktitle = {Information Security Theory and Practice. Securing the Internet of Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8501}, pages = {124--139}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43826-8\_9}, doi = {10.1007/978-3-662-43826-8\_9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/AkramK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/AkramMM14, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {An Introduction to the Trusted Platform Module and Mobile Trusted Module}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {71--93}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_4}, doi = {10.1007/978-1-4614-7915-4\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/14/AkramMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/14/AkramMM14a, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Konstantinos Markantonakis and Keith Mayes}, title = {An Introduction to Java Card Programming}, booktitle = {Secure Smart Embedded Devices, Platforms and Applications}, pages = {497--513}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7915-4\_22}, doi = {10.1007/978-1-4614-7915-4\_22}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/14/AkramMM14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/AkramMM13, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {Recovering from a Lost Digital Wallet}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications {\&} 2013 {IEEE} International Conference on Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China, November 13-15, 2013}, pages = {1615--1621}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCC.and.EUC.2013.227}, doi = {10.1109/HPCC.AND.EUC.2013.227}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/AkramMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/MsgnaMMA13, author = {Mehari Msgna and Konstantinos Markantonakis and Keith Mayes and Raja Naeem Akram}, title = {Subscriber Centric Conditional Access System for Pay-TV Systems}, booktitle = {{IEEE} 10th International Conference on e-Business Engineering, {ICEBE} 2013, Coventry, United Kingdom, September 11-13, 2013}, pages = {450--455}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICEBE.2013.70}, doi = {10.1109/ICEBE.2013.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/MsgnaMMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AkramMM13, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {151--166}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_12}, doi = {10.1007/978-3-319-02726-5\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AkramMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isspit/AkramM13, author = {Raja Naeem Akram and Konstantinos Markantonakis}, title = {Smart cards: State-of-the-art to future directions}, booktitle = {{IEEE} International Symposium on Signal Processing and Information Technology, Athens, Greece, December 12-15, 2013}, pages = {154--162}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ISSPIT.2013.6781871}, doi = {10.1109/ISSPIT.2013.6781871}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isspit/AkramM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/AkramMM13, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Changshe Ma and Jian Weng}, title = {Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions}, booktitle = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013}, series = {Cryptology and Information Security Series}, volume = {11}, pages = {107--121}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-328-5-107}, doi = {10.3233/978-1-61499-328-5-107}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/AkramMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMM13, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model}, booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th {IEEE} International Symposium on Parallel and Distributed Processing with Applications, {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013}, pages = {336--345}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/TrustCom.2013.245}, doi = {10.1109/TRUSTCOM.2013.245}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Akram12, author = {Raja Naeem Akram}, title = {A user centric security model for tamper-resistant devices}, school = {Royal Holloway, University of London, {UK}}, year = {2012}, url = {http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Akram12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/AkramMM12, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {Building the Bridges - {A} Proposal for Merging Different Paradigms in Mobile {NFC} Ecosystem}, booktitle = {Eighth International Conference on Computational Intelligence and Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012}, pages = {646--652}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CIS.2012.149}, doi = {10.1109/CIS.2012.149}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/AkramMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AkramMM12, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Coopetitive Architecture to Support a Dynamic and Scalable {NFC} Based Mobile Services Architecture}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {214--227}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_19}, doi = {10.1007/978-3-642-34129-8\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/AkramMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/AkramMM12, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Albert Levi and Mohamad Badra and Matteo Cesana and Mona Ghassemian and {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and Nafa{\^{a}} Jabeur and Marek Klonowski and Antonio Ma{\~{n}}a and Susana Sargento and Sherali Zeadally}, title = {Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis}, booktitle = {5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NTMS.2012.6208760}, doi = {10.1109/NTMS.2012.6208760}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ntms/AkramMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMM12, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {A Privacy Preserving Application Acquisition Protocol}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {383--392}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.47}, doi = {10.1109/TRUSTCOM.2012.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AkramMM11, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Udaya Parampalli and Philip Hawkes}, title = {Application-Binding Protocol in the User Centric Smart Card Ownership Model}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {208--225}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_14}, doi = {10.1007/978-3-642-22497-3\_14}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AkramMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icebe/AkramMM11, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {User Centric Security Model for Tamper-Resistant Devices}, booktitle = {{IEEE} 8th International Conference on e-Business Engineering, {ICEBE} 2011, Beijing, China, October 19-21, 2011}, pages = {168--177}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICEBE.2011.69}, doi = {10.1109/ICEBE.2011.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icebe/AkramMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AkramMM11, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {Cross-Platform Application Sharing Mechanism}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {597--605}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.77}, doi = {10.1109/TRUSTCOM.2011.77}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AkramMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AkramMM10, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Dieter Gollmann and Jean{-}Louis Lanet and Julien Iguchi{-}Cartigny}, title = {Firewall Mechanism in a User Centric Smart Card Ownership Model}, booktitle = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2010, Passau, Germany, April 14-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6035}, pages = {118--132}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12510-2\_9}, doi = {10.1007/978-3-642-12510-2\_9}, timestamp = {Sat, 30 May 2020 20:05:42 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AkramMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/AkramMM10, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, title = {Simulator Problem in User Centric Smart Card Ownership Model}, booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010}, pages = {679--686}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/EUC.2010.108}, doi = {10.1109/EUC.2010.108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/AkramMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AkramMM10, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Bernady O. Apduhan and Osvaldo Gervasi and Andr{\'{e}}s Iglesias and David Taniar and Marina L. Gavrilova}, title = {A Paradigm Shift in Smart Card Ownership Model}, booktitle = {Prodeedings of the 2010 International Conference on Computational Science and Its Applications, {ICCSA} 2010, Fukuoka, Japan, March 23-26, 2010}, pages = {191--200}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICCSA.2010.52}, doi = {10.1109/ICCSA.2010.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/AkramMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AkramMM10, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Kai Rannenberg and Vijay Varadharajan and Christian Weber}, title = {A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism}, booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11} International Information Security Conference, {SEC} 2010, Held as Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {330}, pages = {161--172}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15257-3\_15}, doi = {10.1007/978-3-642-15257-3\_15}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/AkramMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/AkramMM09, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Robert Meersman and Pilar Herrero and Tharam S. Dillon}, title = {Location Based Application Availability}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, {OTM} Academy, SWWS, SEMELS, Beyond SAWSDL, and {COMBEK} 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5872}, pages = {128--138}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05290-3\_22}, doi = {10.1007/978-3-642-05290-3\_22}, timestamp = {Thu, 14 Oct 2021 10:28:27 +0200}, biburl = {https://dblp.org/rec/conf/otm/AkramMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AkramMM09, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Heung Youl Youm and Moti Yung}, title = {Application Management Framework in User Centric Smart Card Ownership Model}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {20--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_3}, doi = {10.1007/978-3-642-10838-9\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AkramMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.