Practical NFC peer-to-peer relay attack using mobile phones L Francis, G Hancke, K Mayes, K Markantonakis International Workshop on Radio Frequency Identification: Security and …, 2010 | 248 | 2010 |
Smart cards, tokens, security and applications KE Mayes, K Markantonakis Springer, 2008 | 216 | 2008 |
Smart cards, tokens, security and applications KE Mayes, K Markantonakis Springer, 2008 | 211 | 2008 |
Confidence in smart token proximity: Relay attacks revisited GP Hancke, KE Mayes, K Markantonakis Computers & Security 28 (7), 615-627, 2009 | 141 | 2009 |
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. L Francis, GP Hancke, K Mayes, K Markantonakis IACR Cryptol. ePrint Arch. 2011, 618, 2011 | 132 | 2011 |
HB-MP+ Protocol: An Improvement on the HB-MP Protocol X Leng, K Mayes, K Markantonakis 2008 IEEE international conference on RFID, 118-124, 2008 | 94 | 2008 |
Security challenges for user-oriented RFID applications within the" Internet of things" GP Hancke, K Markantonakis, KE Mayes Journal of Internet Technology 11 (3), 307-313, 2010 | 80 | 2010 |
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy FS Hardwick, A Gioulis, RN Akram, K Markantonakis 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 71 | 2018 |
Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 71 | 2009 |
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms L Francis, G Hancke, K Mayes, K Markantonakis 2009 International Conference for Internet Technology and Secured …, 2009 | 53 | 2009 |
A paradigm shift in smart card ownership model RN Akram, K Markantonakis, K Mayes 2010 International Conference on Computational Science and Its Applications …, 2010 | 48 | 2010 |
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ... 2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016 | 44 | 2016 |
Precise instruction-level side channel profiling of embedded processors M Msgna, K Markantonakis, K Mayes International conference on information security practice and experience …, 2014 | 35 | 2014 |
Practical relay attack on contactless transactions by using nfc mobile phones K Markantonakis, L Francis, G Hancke, K Mayes Radio Frequency Identification System Security: RFIDsec 12, 21, 2012 | 35 | 2012 |
Application management framework in user centric smart card ownership model RN Akram, K Markantonakis, K Mayes International Workshop on Information Security Applications, 20-35, 2009 | 33 | 2009 |
Application management framework in user centric smart card ownership model RN Akram, K Markantonakis, K Mayes International Workshop on Information Security Applications, 20-35, 2009 | 33 | 2009 |
A Secure Channel protocol for multi-application smart cards based on public key cryptography K Markantonakis, K Mayes Communications and Multimedia Security, 79-95, 2005 | 33 | 2005 |
Security, privacy and safety evaluation of dynamic and static fleets of drones RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ... 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017 | 31 | 2017 |
Secure improved cloud-based RFID authentication protocol S Abughazalah, K Markantonakis, K Mayes Data privacy management, autonomous spontaneous security, and security …, 2014 | 30 | 2014 |
A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery Q Zhang, K Markantonakis, K Mayes IEEE International Conference on Computer Systems and Applications, 2006 …, 2006 | 28 | 2006 |