BibTeX records: Raja Naeem Akram

download as .bib file

@article{DBLP:journals/corr/abs-2103-08229,
  author       = {Georges{-}Axel Jaloyan and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Robin and
                  Keith Mayes and
                  David Naccache},
  title        = {Return-Oriented Programming on {RISC-V}},
  journal      = {CoRR},
  volume       = {abs/2103.08229},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08229},
  eprinttype    = {arXiv},
  eprint       = {2103.08229},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08229.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SemalMAK20,
  author       = {Benjamin Semal and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Jan Kalbantner},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {360--377},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_20},
  doi          = {10.1007/978-3-030-61638-0\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SemalMAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JaloyanMARMN20,
  author       = {Georges{-}Axel Jaloyan and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Robin and
                  Keith Mayes and
                  David Naccache},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {Return-Oriented Programming on {RISC-V}},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {471--480},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384738},
  doi          = {10.1145/3320269.3384738},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JaloyanMARMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SemalMAK20,
  author       = {Benjamin Semal and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Jan Kalbantner},
  editor       = {Marko H{\"{o}}lbl and
                  Kai Rannenberg and
                  Tatjana Welzer},
  title        = {Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core
                  Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11
                  International Conference, {SEC} 2020, Maribor, Slovenia, September
                  21-23, 2020, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {580},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58201-2\_1},
  doi          = {10.1007/978-3-030-58201-2\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SemalMAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HeckmannMMAN19,
  author       = {Thibaut Heckmann and
                  James P. McEvoy and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  David Naccache},
  title        = {Removing epoxy underfill between neighbouring components using acid
                  for component chip-off},
  journal      = {Digit. Investig.},
  volume       = {29},
  pages        = {198--209},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.003},
  doi          = {10.1016/J.DIIN.2019.04.003},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HeckmannMMAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/LeeMA19,
  author       = {Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram},
  title        = {Ensuring Secure Application Execution and Platform-Specific Execution
                  in Embedded Devices},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {18},
  number       = {3},
  pages        = {26:1--26:21},
  year         = {2019},
  url          = {https://doi.org/10.1145/3284361},
  doi          = {10.1145/3284361},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tecs/LeeMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NguyenAMLW19,
  author       = {Khuong An Nguyen and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Zhiyuan Luo and
                  Chris Watkins},
  title        = {Location Tracking Using Smartphone Accelerometer and Magnetometer
                  Traces},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {96:1--96:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3340518},
  doi          = {10.1145/3339252.3340518},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NguyenAMLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AkramCLSY18,
  author       = {Raja Naeem Akram and
                  Hsiao{-}Hwa Chen and
                  Javier L{\'{o}}pez and
                  Damien Sauveron and
                  Laurence T. Yang},
  title        = {Security, privacy and trust of user-centric solutions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {417--420},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.11.026},
  doi          = {10.1016/J.FUTURE.2017.11.026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/AkramCLSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/TapsellAM18,
  author       = {James Tapsell and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {An Evaluation of the Security of the Bitcoin Peer-To-Peer Network},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {1057--1062},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00195},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00195},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/TapsellAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/HardwickGAM18,
  author       = {Freya Sheer Hardwick and
                  Apostolos Gioulis and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {E-Voting With Blockchain: An E-Voting Protocol with Decentralisation
                  and Voter Privacy},
  booktitle    = {{IEEE} International Conference on Internet of Things (iThings) and
                  {IEEE} Green Computing and Communications (GreenCom) and {IEEE} Cyber,
                  Physical and Social Computing (CPSCom) and {IEEE} Smart Data (SmartData),
                  iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July
                  30 - August 3, 2018},
  pages        = {1561--1567},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/Cybermatics\_2018.2018.00262},
  doi          = {10.1109/CYBERMATICS\_2018.2018.00262},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ithings/HardwickGAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GurulianMFA18,
  author       = {Iakovos Gurulian and
                  Konstantinos Markantonakis and
                  Eibe Frank and
                  Raja Naeem Akram},
  title        = {Good Vibrations: Artificial Ambience-Based Relay Attack Detection},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {481--489},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00075},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00075},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GurulianMFA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HardwickAM18,
  author       = {Freya Sheer Hardwick and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Fair and Transparent Blockchain Based Tendering Framework - {A} Step
                  Towards Open Governance},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1342--1347},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00185},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/HardwickAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TapsellAM18,
  author       = {James Tapsell and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Consumer Centric Data Control, Tracking and Transparency - {A} Position
                  Paper},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1380--1385},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00191},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00191},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TapsellAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/MeisterAM18,
  author       = {Julia A. Meister and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Deep Learning Application in Security and Privacy - Theory and Practice:
                  {A} Position Paper},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_10},
  doi          = {10.1007/978-3-030-20074-9\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/MeisterAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ShepherdAM18,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Olivier Blazy and
                  Chan Yeob Yeun},
  title        = {Remote Credential Management with Mutual Attestation for Trusted Execution
                  Environments},
  booktitle    = {Information Security Theory and Practice - 12th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2018, Brussels, Belgium, December 10-11, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11469},
  pages        = {157--173},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-20074-9\_12},
  doi          = {10.1007/978-3-030-20074-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ShepherdAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-10707,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Secure Remote Credential Management with Mutual Attestation for Constrained
                  Sensing Platforms with TEEs},
  journal      = {CoRR},
  volume       = {abs/1804.10707},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.10707},
  eprinttype    = {arXiv},
  eprint       = {1804.10707},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-10707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-04747,
  author       = {James Tapsell and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Consumer Centric Data Control, Tracking and Transparency - {A} Position
                  Paper},
  journal      = {CoRR},
  volume       = {abs/1805.04747},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.04747},
  eprinttype    = {arXiv},
  eprint       = {1805.04747},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-04747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-05844,
  author       = {Freya Sheer Hardwick and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Fair and Transparent Blockchain based Tendering Framework - {A} Step
                  Towards Open Governance},
  journal      = {CoRR},
  volume       = {abs/1805.05844},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.05844},
  eprinttype    = {arXiv},
  eprint       = {1805.05844},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-05844.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-10258,
  author       = {Freya Sheer Hardwick and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {E-Voting with Blockchain: An E-Voting Protocol with Decentralisation
                  and Voter Privacy},
  journal      = {CoRR},
  volume       = {abs/1805.10258},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.10258},
  eprinttype    = {arXiv},
  eprint       = {1805.10258},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-10258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-10259,
  author       = {James Tapsell and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {An evaluation of the security of the Bitcoin Peer-to- Peer Network},
  journal      = {CoRR},
  volume       = {abs/1805.10259},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.10259},
  eprinttype    = {arXiv},
  eprint       = {1805.10259},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-10259.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-00190,
  author       = {Julia A. Meister and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Deep Learning Application in Security and Privacy - Theory and Practice:
                  {A} Position Paper},
  journal      = {CoRR},
  volume       = {abs/1812.00190},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.00190},
  eprinttype    = {arXiv},
  eprint       = {1812.00190},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-00190.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GurulianMAM17,
  author       = {Iakovos Gurulian and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Artificial Ambient Environments for Proximity Critical Applications},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {5:1--5:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098964},
  doi          = {10.1145/3098954.3098964},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GurulianMAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ShepherdAM17,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Establishing Mutually Trusted Channels for Remote Sensing Devices
                  with Trusted Execution Environments},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {7:1--7:10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3098971},
  doi          = {10.1145/3098954.3098971},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ShepherdAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LeeMA17,
  author       = {Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram},
  title        = {Provisioning Software with Hardware-Software Binding},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {49:1--49:9},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3103158},
  doi          = {10.1145/3098954.3103158},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LeeMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/Gurulian0MA17,
  author       = {Iakovos Gurulian and
                  Gerhard P. Hancke and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram},
  editor       = {Thomas Eisenbarth and
                  Yannick Teglia},
  title        = {May the Force Be with You: Force-Based Relay Attack Detection},
  booktitle    = {Smart Card Research and Advanced Applications - 16th International
                  Conference, {CARDIS} 2017, Lugano, Switzerland, November 13-15, 2017,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10728},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75208-2\_9},
  doi          = {10.1007/978-3-319-75208-2\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/Gurulian0MA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HakenMGSA17,
  author       = {Gareth Haken and
                  Konstantinos Markantonakis and
                  Iakovos Gurulian and
                  Carlton Shepherd and
                  Raja Naeem Akram},
  editor       = {Jianying Zhou and
                  Ernesto Damiani},
  title        = {Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure
                  for Apple Pay},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Cyber-Physical System Security,
                  CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017},
  pages        = {21--32},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055186.3055201},
  doi          = {10.1145/3055186.3055201},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HakenMGSA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ShepherdAM17,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {Towards trusted execution of multi-modal continuous authentication
                  schemes},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {1444--1451},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019652},
  doi          = {10.1145/3019612.3019652},
  timestamp    = {Wed, 01 Feb 2023 17:58:48 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ShepherdAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/GurulianAMM17,
  author       = {Iakovos Gurulian and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Ahmed Seffah and
                  Birgit Penzenstadler and
                  Carina Alves and
                  Xin Peng},
  title        = {Preventing relay attacks in mobile transactions using infrared light},
  booktitle    = {Proceedings of the Symposium on Applied Computing, {SAC} 2017, Marrakech,
                  Morocco, April 3-7, 2017},
  pages        = {1724--1731},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3019612.3019794},
  doi          = {10.1145/3019612.3019794},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/GurulianAMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/GurulianMSFA17,
  author       = {Iakovos Gurulian and
                  Konstantinos Markantonakis and
                  Carlton Shepherd and
                  Eibe Frank and
                  Raja Naeem Akram},
  editor       = {Pooya Farshim and
                  Emil Simion},
  title        = {Proximity Assurances Based on Natural and Artificial Ambient Environments},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 10th International Conference, SecITC 2017, Bucharest, Romania,
                  June 8-9, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10543},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69284-5\_7},
  doi          = {10.1007/978-3-319-69284-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/GurulianMSFA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShepherdGFMAPM17,
  author       = {Carlton Shepherd and
                  Iakovos Gurulian and
                  Eibe Frank and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Emmanouil Panaousis and
                  Keith Mayes},
  title        = {The Applicability of Ambient Sensors as Proximity Evidence for {NFC}
                  Transactions},
  booktitle    = {2017 {IEEE} Security and Privacy Workshops, {SP} Workshops 2017, San
                  Jose, CA, USA, May 25, 2017},
  pages        = {179--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/SPW.2017.29},
  doi          = {10.1109/SPW.2017.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ShepherdGFMAPM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ShepherdPAM17,
  author       = {Carlton Shepherd and
                  Fabien A. P. Petitcolas and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Javier L{\'{o}}pez and
                  Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis},
  title        = {An Exploratory Analysis of the Security Risks of the Internet of Things
                  in Finance},
  booktitle    = {Trust, Privacy and Security in Digital Business - 14th International
                  Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10442},
  pages        = {164--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64483-7\_11},
  doi          = {10.1007/978-3-319-64483-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/ShepherdPAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GurulianSFMAM17,
  author       = {Iakovos Gurulian and
                  Carlton Shepherd and
                  Eibe Frank and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {On the Effectiveness of Ambient Sensing for Detecting {NFC} Relay
                  Attacks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {41--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.218},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GurulianSFMAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AkramMMBCSC17,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Amina Cherif and
                  Damien Sauveron and
                  Serge Chaumette},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {A Secure and Trusted Channel Protocol for UAVs Fleets},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_1},
  doi          = {10.1007/978-3-319-93524-9\_1},
  timestamp    = {Fri, 09 Apr 2021 18:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/AkramMMBCSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/JayasingheCMAM17,
  author       = {Danushka Jayasinghe and
                  Sheila Cobourne and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {Philanthropy on the Blockchain},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {25--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_2},
  doi          = {10.1007/978-3-319-93524-9\_2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/JayasingheCMAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/ShepherdAM17,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Gerhard P. Hancke and
                  Ernesto Damiani},
  title        = {EmLog: Tamper-Resistant System Logging for Constrained Devices with
                  TEEs},
  booktitle    = {Information Security Theory and Practice - 11th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2017, Heraklion, Crete, Greece, September 28-29,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10741},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93524-9\_5},
  doi          = {10.1007/978-3-319-93524-9\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/ShepherdAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/MarkantonakisA17,
  author       = {Konstantinos Markantonakis and
                  Raja Naeem Akram},
  editor       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Multi-Application Smart Card Platforms and Operating Systems},
  booktitle    = {Smart Cards, Tokens, Security and Applications, Second Edition},
  pages        = {59--92},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-50500-8\_3},
  doi          = {10.1007/978-3-319-50500-8\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/MarkantonakisA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/WaiteMA17,
  author       = {Gary Waite and
                  Keith Mayes and
                  Raja Naeem Akram},
  editor       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Application Development Environments for Java and {SIM} Toolkit},
  booktitle    = {Smart Cards, Tokens, Security and Applications, Second Edition},
  pages        = {253--281},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-50500-8\_10},
  doi          = {10.1007/978-3-319-50500-8\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/WaiteMA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/SauveronAM17,
  author       = {Damien Sauveron and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Smart Card Reader and Mobile APIs},
  booktitle    = {Smart Cards, Tokens, Security and Applications, Second Edition},
  pages        = {305--349},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-50500-8\_12},
  doi          = {10.1007/978-3-319-50500-8\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/SauveronAM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05417,
  author       = {Collins Mtita and
                  Maryline Laurent and
                  Damien Sauveron and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Serge Chaumette},
  title        = {Serverless Protocols for Inventory and Tracking with a {UAV}},
  journal      = {CoRR},
  volume       = {abs/1708.05417},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05417},
  eprinttype    = {arXiv},
  eprint       = {1708.05417},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-05732,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Oussama Habachi and
                  Damien Sauveron and
                  Andreas Steyven and
                  Serge Chaumette},
  title        = {Security, Privacy and Safety Evaluation of Dynamic and Static Fleets
                  of Drones},
  journal      = {CoRR},
  volume       = {abs/1708.05732},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.05732},
  eprinttype    = {arXiv},
  eprint       = {1708.05732},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-05732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-03943,
  author       = {Carlton Shepherd and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {EmLog: Tamper-Resistant System Logging for Constrained Devices with
                  TEEs},
  journal      = {CoRR},
  volume       = {abs/1712.03943},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.03943},
  eprinttype    = {arXiv},
  eprint       = {1712.03943},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-03943.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/AkramMS16,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Recovering from a lost digital wallet: {A} smart cards perspective
                  extended abstract},
  journal      = {Pervasive Mob. Comput.},
  volume       = {29},
  pages        = {113--129},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2015.06.018},
  doi          = {10.1016/J.PMCJ.2015.06.018},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/AkramMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/MsgnaFAM16,
  author       = {Mehari G. Msgna and
                  Houda Ferradi and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Peter Y. A. Ryan and
                  David Naccache and
                  Jean{-}Jacques Quisquater},
  title        = {Secure Application Execution in Mobile Devices},
  booktitle    = {The New Codebreakers - Essays Dedicated to David Kahn on the Occasion
                  of His 85th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9100},
  pages        = {417--438},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49301-4\_26},
  doi          = {10.1007/978-3-662-49301-4\_26},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/MsgnaFAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeeMA16,
  author       = {Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez},
  title        = {Binding Hardware and Software to Prevent Firmware Modification and
                  Device Counterfeiting},
  booktitle    = {Proceedings of the 2nd {ACM} International Workshop on Cyber-Physical
                  System Security, CPSS@AsiaCCS, Xi'an, China, May 30, 2016},
  pages        = {70--81},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2899015.2899029},
  doi          = {10.1145/2899015.2899029},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeeMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MansorMAMG16,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes and
                  Iakovos Gurulian},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {Log Your Car: Reliable Maintenance Services Record},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {484--504},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_30},
  doi          = {10.1007/978-3-319-54705-3\_30},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MansorMAMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/HassanMA16,
  author       = {Rashedul Hassan and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram},
  editor       = {Jingzhi Guo and
                  Hongming Cai and
                  Xiang Fei and
                  Kuo{-}Ming Chao and
                  Jen{-}Yao Chung},
  title        = {Can You Call the Software in Your Device be Firmware?},
  booktitle    = {13th {IEEE} International Conference on e-Business Engineering, {ICEBE}
                  2016, Macau, China, November 4-6, 2016},
  pages        = {188--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICEBE.2016.040},
  doi          = {10.1109/ICEBE.2016.040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/HassanMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/JayasingheMAM16,
  author       = {Danushka Jayasinghe and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  editor       = {Gerhard P. Hancke and
                  Konstantinos Markantonakis},
  title        = {Enhancing {EMV} Tokenisation with Dynamic Transaction Tokens},
  booktitle    = {Radio Frequency Identification and IoT Security - 12th International
                  Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2,
                  2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10155},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-62024-4\_8},
  doi          = {10.1007/978-3-319-62024-4\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/JayasingheMAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ShepherdAGLMASC16,
  author       = {Carlton Shepherd and
                  Ghada Arfaoui and
                  Iakovos Gurulian and
                  Robert P. Lee and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Damien Sauveron and
                  Emmanuel Conchon},
  title        = {Secure and Trusted Execution: Past, Present, and Future - {A} Critical
                  Review in the Context of the Internet of Things and Cyber-Physical
                  Systems},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {168--177},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0060},
  doi          = {10.1109/TRUSTCOM.2016.0060},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ShepherdAGLMASC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayasingheMGAM16,
  author       = {Danushka Jayasinghe and
                  Konstantinos Markantonakis and
                  Iakovos Gurulian and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Extending {EMV} Tokenised Payments to Offline-Environments},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {443--450},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0095},
  doi          = {10.1109/TRUSTCOM.2016.0095},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayasingheMGAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramBCMS16,
  author       = {Raja Naeem Akram and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Serge Chaumette and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure
                  Elements},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {606--614},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0116},
  doi          = {10.1109/TRUSTCOM.2016.0116},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramBCMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MansorMAMG16,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes and
                  Iakovos Gurulian},
  title        = {Log Your Car: The Non-invasive Vehicle Forensics},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {974--982},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0164},
  doi          = {10.1109/TRUSTCOM.2016.0164},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MansorMAMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AkramGSMM16,
  author       = {Raja Naeem Akram and
                  Iakovos Gurulian and
                  Carlton Shepherd and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism
                  for Mobile Payments},
  journal      = {CoRR},
  volume       = {abs/1601.07101},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.07101},
  eprinttype    = {arXiv},
  eprint       = {1601.07101},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AkramGSMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GurulianSMAM16,
  author       = {Iakovos Gurulian and
                  Carlton Shepherd and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {When Theory and Reality Collide: Demystifying the Effectiveness of
                  Ambient Sensing for NFC-based Proximity Detection by Applying Relay
                  Attack Data},
  journal      = {CoRR},
  volume       = {abs/1605.00425},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.00425},
  eprinttype    = {arXiv},
  eprint       = {1605.00425},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GurulianSMAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AkramM16,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Challenges of Security and Trust of Mobile Devices as Digital Avionics
                  Component},
  journal      = {CoRR},
  volume       = {abs/1605.00446},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.00446},
  eprinttype    = {arXiv},
  eprint       = {1605.00446},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AkramM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AkramMMBSC16,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Damien Sauveron and
                  Serge Chaumette},
  title        = {Security and Performance Comparison of Different Secure Channel Protocols
                  for Avionics Wireless Networks},
  journal      = {CoRR},
  volume       = {abs/1608.04115},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04115},
  eprinttype    = {arXiv},
  eprint       = {1608.04115},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AkramMMBSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AkramMMBSC16a,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Damien Sauveron and
                  Serge Chaumette},
  title        = {An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1608.04116},
  year         = {2016},
  url          = {http://arxiv.org/abs/1608.04116},
  eprinttype    = {arXiv},
  eprint       = {1608.04116},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AkramMMBSC16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/AkramMS15,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {A novel consumer-centric card management architecture and potential
                  security issues},
  journal      = {Inf. Sci.},
  volume       = {321},
  pages        = {150--161},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ins.2014.12.049},
  doi          = {10.1016/J.INS.2014.12.049},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/AkramMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/MansorMAM15,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  title        = {Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {139--148},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.58},
  doi          = {10.1109/ARES.2015.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/MansorMAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AkramMM15,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Enhancing Java Runtime Environment for Smart Cards Against Runtime
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9327},
  pages        = {541--560},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24177-7\_27},
  doi          = {10.1007/978-3-319-24177-7\_27},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AkramMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MansorMAM15,
  author       = {Hafizah Mansor and
                  Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Keith Mayes},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Let's Get Mobile: Secure {FOTA} for Automotive System},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {503--510},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_38},
  doi          = {10.1007/978-3-319-25645-0\_38},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MansorMAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/MarkantonakisAM15,
  author       = {Konstantinos Markantonakis and
                  Raja Naeem Akram and
                  Mehari G. Msgna},
  editor       = {Ion Bica and
                  David Naccache and
                  Emil Simion},
  title        = {Secure and Trusted Application Execution on Embedded Devices},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 8th International Conference, {SECITC} 2015, Bucharest, Romania,
                  June 11-12, 2015. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9522},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27179-8\_1},
  doi          = {10.1007/978-3-319-27179-8\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/MarkantonakisAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMSM15,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron and
                  Keith Mayes},
  title        = {Feature Interaction Problems in Smart Cards with Dynamic Application
                  Lifecycle and Their Countermeasures},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {483--490},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.410},
  doi          = {10.1109/TRUSTCOM.2015.410},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/BonnefoiDSAM15,
  author       = {Pierre{-}Fran{\c{c}}ois Bonnefoi and
                  Pierre Dusart and
                  Damien Sauveron and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {A Set of Efficient Privacy Protection Enforcing Lightweight Authentication
                  Protocols for Low-Cost {RFID} Tags},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {612--620},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.426},
  doi          = {10.1109/TRUSTCOM.2015.426},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/BonnefoiDSAM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayasingheAMRM15,
  author       = {Danushka Jayasinghe and
                  Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Konstantinos Rantos and
                  Keith Mayes},
  title        = {Enhancing {EMV} Online {PIN} Verification},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {808--817},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.451},
  doi          = {10.1109/TRUSTCOM.2015.451},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JayasingheAMRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2015,
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3},
  doi          = {10.1007/978-3-319-24018-3},
  isbn         = {978-3-319-24017-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/AkramM14,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis},
  editor       = {Theo Tryfonas and
                  Ioannis G. Askoxylakis},
  title        = {Rethinking the Smart Card Technology},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - Second
                  International Conference, {HAS} 2014, Held as Part of {HCI} International
                  2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8533},
  pages        = {221--232},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07620-1\_20},
  doi          = {10.1007/978-3-319-07620-1\_20},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/AkramM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AkramKL14,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko and
                  Tsz Fung Law},
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {Consumer-centric protection for online social networks},
  booktitle    = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IRI.2014.7051872},
  doi          = {10.1109/IRI.2014.7051872},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/AkramKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/AkramMM14,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Mohamad Badra and
                  Omar Alfandi},
  title        = {Trusted Platform Module for Smart Cards},
  booktitle    = {6th International Conference on New Technologies, Mobility and Security,
                  {NTMS} 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/NTMS.2014.6814058},
  doi          = {10.1109/NTMS.2014.6814058},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/AkramMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMS14,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Damien Sauveron},
  title        = {Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {448--456},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.57},
  doi          = {10.1109/TRUSTCOM.2014.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramK14,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko},
  title        = {Unified Model for Data Security - {A} Position Paper},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {831--839},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.110},
  doi          = {10.1109/TRUSTCOM.2014.110},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramK14a,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko},
  title        = {Digital Trust - Trusted Computing and Beyond: {A} Position Paper},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {884--892},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.116},
  doi          = {10.1109/TRUSTCOM.2014.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/AkramK14,
  author       = {Raja Naeem Akram and
                  Ryan K. L. Ko},
  editor       = {David Naccache and
                  Damien Sauveron},
  title        = {End-to-End Secure and Privacy Preserving Mobile Chat Application},
  booktitle    = {Information Security Theory and Practice. Securing the Internet of
                  Things - 8th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2014,
                  Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8501},
  pages        = {124--139},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43826-8\_9},
  doi          = {10.1007/978-3-662-43826-8\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/AkramK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/AkramMM14,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {An Introduction to the Trusted Platform Module and Mobile Trusted
                  Module},
  booktitle    = {Secure Smart Embedded Devices, Platforms and Applications},
  pages        = {71--93},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7915-4\_4},
  doi          = {10.1007/978-1-4614-7915-4\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/AkramMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/14/AkramMM14a,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {An Introduction to Java Card Programming},
  booktitle    = {Secure Smart Embedded Devices, Platforms and Applications},
  pages        = {497--513},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7915-4\_22},
  doi          = {10.1007/978-1-4614-7915-4\_22},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/14/AkramMM14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/AkramMM13,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Recovering from a Lost Digital Wallet},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications {\&} 2013 {IEEE} International Conference on
                  Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
                  November 13-15, 2013},
  pages        = {1615--1621},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCC.and.EUC.2013.227},
  doi          = {10.1109/HPCC.AND.EUC.2013.227},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/AkramMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/MsgnaMMA13,
  author       = {Mehari Msgna and
                  Konstantinos Markantonakis and
                  Keith Mayes and
                  Raja Naeem Akram},
  title        = {Subscriber Centric Conditional Access System for Pay-TV Systems},
  booktitle    = {{IEEE} 10th International Conference on e-Business Engineering, {ICEBE}
                  2013, Coventry, United Kingdom, September 11-13, 2013},
  pages        = {450--455},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICEBE.2013.70},
  doi          = {10.1109/ICEBE.2013.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/MsgnaMMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AkramMM13,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom
                  Number Generators},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_12},
  doi          = {10.1007/978-3-319-02726-5\_12},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/AkramMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/AkramM13,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis},
  title        = {Smart cards: State-of-the-art to future directions},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, Athens, Greece, December 12-15, 2013},
  pages        = {154--162},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSPIT.2013.6781871},
  doi          = {10.1109/ISSPIT.2013.6781871},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/AkramM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/AkramMM13,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {Remote Attestation Mechanism for Embedded Devices Based on Physical
                  Unclonable Functions},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  pages        = {107--121},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-328-5-107},
  doi          = {10.3233/978-1-61499-328-5-107},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/AkramMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMM13,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {A Secure and Trusted Channel Protocol for the User Centric Smart Card
                  Ownership Model},
  booktitle    = {12th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
                  Symposium on Parallel and Distributed Processing with Applications,
                  {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
                  and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages        = {336--345},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/TrustCom.2013.245},
  doi          = {10.1109/TRUSTCOM.2013.245},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Akram12,
  author       = {Raja Naeem Akram},
  title        = {A user centric security model for tamper-resistant devices},
  school       = {Royal Holloway, University of London, {UK}},
  year         = {2012},
  url          = {http://repository.royalholloway.ac.uk/items/aca52f8c-6233-4f73-a9da-025d25ab1295/1/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Akram12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/AkramMM12,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Building the Bridges - {A} Proposal for Merging Different Paradigms
                  in Mobile {NFC} Ecosystem},
  booktitle    = {Eighth International Conference on Computational Intelligence and
                  Security, {CIS} 2012, Guangzhou, China, November 17-18, 2012},
  pages        = {646--652},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CIS.2012.149},
  doi          = {10.1109/CIS.2012.149},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/AkramMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/AkramMM12,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Coopetitive Architecture to Support a Dynamic and Scalable {NFC} Based
                  Mobile Services Architecture},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {214--227},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_19},
  doi          = {10.1007/978-3-642-34129-8\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/AkramMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/AkramMM12,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Albert Levi and
                  Mohamad Badra and
                  Matteo Cesana and
                  Mona Ghassemian and
                  {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
                  Nafa{\^{a}} Jabeur and
                  Marek Klonowski and
                  Antonio Ma{\~{n}}a and
                  Susana Sargento and
                  Sherali Zeadally},
  title        = {Pseudorandom Number Generation in Smart Cards: An Implementation,
                  Performance and Randomness Analysis},
  booktitle    = {5th International Conference on New Technologies, Mobility and Security,
                  Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NTMS.2012.6208760},
  doi          = {10.1109/NTMS.2012.6208760},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ntms/AkramMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMM12,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {A Privacy Preserving Application Acquisition Protocol},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {383--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.47},
  doi          = {10.1109/TRUSTCOM.2012.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AkramMM11,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Application-Binding Protocol in the User Centric Smart Card Ownership
                  Model},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_14},
  doi          = {10.1007/978-3-642-22497-3\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AkramMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/AkramMM11,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {User Centric Security Model for Tamper-Resistant Devices},
  booktitle    = {{IEEE} 8th International Conference on e-Business Engineering, {ICEBE}
                  2011, Beijing, China, October 19-21, 2011},
  pages        = {168--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICEBE.2011.69},
  doi          = {10.1109/ICEBE.2011.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icebe/AkramMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AkramMM11,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Cross-Platform Application Sharing Mechanism},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {597--605},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.77},
  doi          = {10.1109/TRUSTCOM.2011.77},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AkramMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AkramMM10,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Dieter Gollmann and
                  Jean{-}Louis Lanet and
                  Julien Iguchi{-}Cartigny},
  title        = {Firewall Mechanism in a User Centric Smart Card Ownership Model},
  booktitle    = {Smart Card Research and Advanced Application, 9th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2010, Passau, Germany, April 14-16,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6035},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12510-2\_9},
  doi          = {10.1007/978-3-642-12510-2\_9},
  timestamp    = {Sat, 30 May 2020 20:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AkramMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/AkramMM10,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {Simulator Problem in User Centric Smart Card Ownership Model},
  booktitle    = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
                  Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  pages        = {679--686},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/EUC.2010.108},
  doi          = {10.1109/EUC.2010.108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/AkramMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AkramMM10,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Bernady O. Apduhan and
                  Osvaldo Gervasi and
                  Andr{\'{e}}s Iglesias and
                  David Taniar and
                  Marina L. Gavrilova},
  title        = {A Paradigm Shift in Smart Card Ownership Model},
  booktitle    = {Prodeedings of the 2010 International Conference on Computational
                  Science and Its Applications, {ICCSA} 2010, Fukuoka, Japan, March
                  23-26, 2010},
  pages        = {191--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICCSA.2010.52},
  doi          = {10.1109/ICCSA.2010.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/AkramMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/AkramMM10,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Kai Rannenberg and
                  Vijay Varadharajan and
                  Christian Weber},
  title        = {A Dynamic and Ubiquitous Smart Card Security Assurance and Validation
                  Mechanism},
  booktitle    = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
                  International Information Security Conference, {SEC} 2010, Held as
                  Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {330},
  pages        = {161--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15257-3\_15},
  doi          = {10.1007/978-3-642-15257-3\_15},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/AkramMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/AkramMM09,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Robert Meersman and
                  Pilar Herrero and
                  Tharam S. Dillon},
  title        = {Location Based Application Availability},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2009 Workshops,
                  Confederated International Workshops and Posters, ADI, CAMS, EI2N,
                  ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, {OTM} Academy, SWWS, SEMELS,
                  Beyond SAWSDL, and {COMBEK} 2009, Vilamoura, Portugal, November 1-6,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5872},
  pages        = {128--138},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05290-3\_22},
  doi          = {10.1007/978-3-642-05290-3\_22},
  timestamp    = {Thu, 14 Oct 2021 10:28:27 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/AkramMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AkramMM09,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Application Management Framework in User Centric Smart Card Ownership
                  Model},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_3},
  doi          = {10.1007/978-3-642-10838-9\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AkramMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics