Practical NFC peer-to-peer relay attack using mobile phones L Francis, G Hancke, K Mayes, K Markantonakis International Workshop on Radio Frequency Identification: Security and …, 2010 | 272 | 2010 |
Smart cards, tokens, security and applications KE Mayes, K Markantonakis Springer, 2008 | 238 | 2008 |
Practical relay attack on contactless transactions by using NFC mobile phones L Francis, G Hancke, K Mayes, K Markantonakis Cryptology ePrint Archive, 2011 | 156 | 2011 |
Confidence in smart token proximity: Relay attacks revisited GP Hancke, KE Mayes, K Markantonakis Computers & Security 28 (7), 615-627, 2009 | 145 | 2009 |
NFC mobile transactions and authentication based on GSM network W Chen, GP Hancke, KE Mayes, Y Lien, JH Chiu 2010 Second International Workshop on Near Field Communication, 83-89, 2010 | 102 | 2010 |
HB-MP+ Protocol: An Improvement on the HB-MP Protocol X Leng, K Mayes, K Markantonakis 2008 IEEE international conference on RFID, 118-124, 2008 | 101 | 2008 |
Security challenges for user-oriented RFID applications within the" Internet of things" GP Hancke, K Markantonakis, KE Mayes Journal of Internet Technology 11 (3), 307-313, 2010 | 93 | 2010 |
Attacking smart card systems: Theory and practice K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes information security technical report 14 (2), 46-56, 2009 | 76 | 2009 |
Reading order independent grouping proof for RFID tags Y Lien, X Leng, K Mayes, JH Chiu 2008 IEEE international conference on intelligence and security informatics …, 2008 | 66 | 2008 |
Security, privacy and safety evaluation of dynamic and static fleets of drones RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ... 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017 | 65 | 2017 |
Using 3G network components to enable NFC mobile transactions and authentication WD Chen, GP Hancke, KE Mayes, Y Lien, JH Chiu 2010 IEEE International Conference on Progress in Informatics and Computing …, 2010 | 63 | 2010 |
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms L Francis, G Hancke, K Mayes, K Markantonakis 2009 International Conference for Internet Technology and Secured …, 2009 | 59 | 2009 |
NFC mobile payment with Citizen Digital Certificate WD Chen, KE Mayes, YH Lien, JH Chiu The 2nd International Conference on Next Generation Information Technology …, 2011 | 49 | 2011 |
A paradigm shift in smart card ownership model RN Akram, K Markantonakis, K Mayes 2010 International Conference on Computational Science and Its Applications …, 2010 | 49 | 2010 |
Precise instruction-level side channel profiling of embedded processors M Msgna, K Markantonakis, K Mayes International conference on information security practice and experience …, 2014 | 45 | 2014 |
Log your car: The non-invasive vehicle forensics H Mansor, K Markantonakis, RN Akram, K Mayes, I Gurulian 2016 IEEE Trustcom/BigDataSE/ISPA, 974-982, 2016 | 41 | 2016 |
Practical relay attack on contactless transactions by using nfc mobile phones K Markantonakis, L Francis, G Hancke, K Mayes Radio Frequency Identification System Security: RFIDsec 12, 21, 2012 | 38 | 2012 |
A Secure Channel protocol for multi-application smart cards based on public key cryptography K Markantonakis, K Mayes Communications and Multimedia Security, 79-95, 2005 | 34 | 2005 |
Secure improved cloud-based RFID authentication protocol S Abughazalah, K Markantonakis, K Mayes Data privacy management, autonomous spontaneous security, and security …, 2014 | 33 | 2014 |
Application management framework in user centric smart card ownership model RN Akram, K Markantonakis, K Mayes International Workshop on Information Security Applications, 20-35, 2009 | 33 | 2009 |