关注
Konstantinos Markantonakis
Konstantinos Markantonakis
Professor of Information Security
在 rhul.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Practical NFC peer-to-peer relay attack using mobile phones
L Francis, G Hancke, K Mayes, K Markantonakis
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
2952010
Smart cards, tokens, security and applications
KE Mayes, K Markantonakis
Springer, 2008
2802008
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy
FS Hardwick, A Gioulis, RN Akram, K Markantonakis
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
2492018
Practical relay attack on contactless transactions by using NFC mobile phones
L Francis, G Hancke, K Mayes, K Markantonakis
Radio Frequency Identification System Security, 21-32, 2012
1682012
Confidence in smart token proximity: Relay attacks revisited
GP Hancke, KE Mayes, K Markantonakis
Computers & Security 28 (7), 615-627, 2009
1562009
Security challenges for user-oriented RFID applications within the" Internet of things"
GP Hancke, K Markantonakis, KE Mayes
Journal of Internet Technology 11 (3), 307-313, 2010
1032010
HB-MP+ Protocol: An Improvement on the HB-MP Protocol
X Leng, K Mayes, K Markantonakis
2008 IEEE international conference on RFID, 118-124, 2008
1022008
Security, privacy and safety evaluation of dynamic and static fleets of drones
RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ...
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017
982017
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016
982016
Attacking smart card systems: Theory and practice
K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes
information security technical report 14 (2), 46-56, 2009
822009
A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks
B Semal, K Markantonakis, RN Akram
2018 IEEE/AIAA 37th digital avionics systems conference (DASC), 1-8, 2018
762018
Log your car: The non-invasive vehicle forensics
H Mansor, K Markantonakis, RN Akram, K Mayes, I Gurulian
2016 IEEE Trustcom/BigDataSE/ISPA, 974-982, 2016
652016
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms
L Francis, G Hancke, K Mayes, K Markantonakis
2009 International Conference for Internet Technology and Secured …, 2009
632009
Precise instruction-level side channel profiling of embedded processors
M Msgna, K Markantonakis, K Mayes
Information Security Practice and Experience: 10th International Conference …, 2014
572014
Fair and transparent blockchain based tendering framework-a step towards open governance
FS Hardwick, RN Akram, K Markantonakis
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
562018
A paradigm shift in smart card ownership model
RN Akram, K Markantonakis, K Mayes
2010 International Conference on Computational Science and Its Applications …, 2010
502010
Secure improved cloud-based RFID authentication protocol
S Abughazalah, K Markantonakis, K Mayes
International Workshop on Data Privacy Management, 147-164, 2014
442014
Philanthropy on the Blockchain
D Jayasinghe, S Cobourne, K Markantonakis, RN Akram, K Mayes
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
432018
Establishing mutually trusted channels for remote sensing devices with trusted execution environments
C Shepherd, RN Akram, K Markantonakis
Proceedings of the 12th International Conference on Availability …, 2017
432017
Errata to: Secure smart embedded devices, platforms and applications
K Markantonakis, K Mayes
Secure Smart Embedded Devices, Platforms and Applications, E3-E14, 2014
412014
系统目前无法执行此操作,请稍后再试。
文章 1–20