Keith Mayes
According to our database1,
Keith Mayes
authored at least 120 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
IEEE Internet Things J., 2021
Enhanced cyber-physical security using attack-resistant cyber nodes and event-triggered moving target defence.
IET Cyper-Phys. Syst.: Theory & Appl., 2021
2020
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
Int. J. Inf. Comput. Secur., 2019
2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Gener. Comput. Syst., 2018
2017
CoRR, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
Future Gener. Comput. Syst., 2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016
CoRR, 2016
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 2016 IEEE International Conference on RFID, 2016
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Authentication based on a changeable biometric using gesture recognition with the Kinect™.
Proceedings of the International Conference on Biometrics, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Int. J. Intell. Inf. Database Syst., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing.
Int. J. Secur. Networks, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Inf. Secur. Tech. Rep., 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Problems and Prospects of Multi Application Smart cards in the UK Financial Industry.
Proceedings of ICEBE 2007, 2007
2006
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006
Secure Deployment of Applications to Fielded Devices and Smart Cards.
Proceedings of the Security in Information Systems, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.
Proceedings of the Communications and Multimedia Security, 2004
2003
Inf. Secur. Tech. Rep., 2003