Practical NFC peer-to-peer relay attack using mobile phones L Francis, G Hancke, K Mayes, K Markantonakis International Workshop on Radio Frequency Identification: Security and …, 2010 | 240 | 2010 |
Smart cards, tokens, security and applications K Markantonakis Springer 2 (3), 4, 2008 | 203 | 2008 |
Smart cards, tokens, security and applications K Markantonakis Springer 2 (3), 4, 2008 | 197 | 2008 |
Confidence in smart token proximity: Relay attacks revisited GP Hancke, KE Mayes, K Markantonakis Computers & Security 28 (7), 615-627, 2009 | 135 | 2009 |
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. L Francis, GP Hancke, K Mayes, K Markantonakis IACR Cryptol. ePrint Arch. 2011, 618, 2011 | 131 | 2011 |
HB-MP+ Protocol: An Improvement on the HB-MP Protocol X Leng, K Mayes, K Markantonakis 2008 IEEE international conference on RFID, 118-124, 2008 | 90 | 2008 |
Security challenges for user-oriented RFID applications within the" Internet of things" GP Hancke, K Markantonakis, KE Mayes Journal of Internet Technology 11 (3), 307-313, 2010 | 78 | 2010 |
Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 70 | 2009 |
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy FS Hardwick, A Gioulis, RN Akram, K Markantonakis 2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018 | 61 | 2018 |
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms L Francis, G Hancke, K Mayes, K Markantonakis 2009 International Conference for Internet Technology and Secured …, 2009 | 50 | 2009 |
A paradigm shift in smart card ownership model RN Akram, K Markantonakis, K Mayes 2010 International Conference on Computational Science and Its Applications …, 2010 | 43 | 2010 |
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ... 2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016 | 40 | 2016 |
Precise instruction-level side channel profiling of embedded processors M Msgna, K Markantonakis, K Mayes International conference on information security practice and experience …, 2014 | 34 | 2014 |
Practical relay attack on contactless transactions by using nfc mobile phones K Markantonakis, L Francis, G Hancke, K Mayes Radio Frequency Identification System Security: RFIDsec 12, 21, 2012 | 33 | 2012 |
A Secure Channel protocol for multi-application smart cards based on public key cryptography K Markantonakis, K Mayes Communications and Multimedia Security, 79-95, 2005 | 32 | 2005 |
Security, privacy and safety evaluation of dynamic and static fleets of drones RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ... 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017 | 29 | 2017 |
Errata to: Secure smart embedded devices, platforms and applications K Markantonakis, K Mayes Secure Smart Embedded Devices, Platforms and Applications, E3-E14, 2014 | 28 | 2014 |
Application management framework in user centric smart card ownership model RN Akram, K Markantonakis, K Mayes International Workshop on Information Security Applications, 20-35, 2009 | 28 | 2009 |
Application management framework in user centric smart card ownership model RN Akram, K Markantonakis, K Mayes International Workshop on Information Security Applications, 20-35, 2009 | 28 | 2009 |
A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery Q Zhang, K Markantonakis, K Mayes IEEE International Conference on Computer Systems and Applications, 2006 …, 2006 | 28 | 2006 |