Konstantinos Markantonakis
Orcid: 0000-0003-3975-9033Affiliations:
- Royal Holloway, University of London, Egham, UK
According to our database1,
Konstantinos Markantonakis
authored at least 173 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Side-Channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
IEEE Trans. Computers, July, 2023
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
IEEE Access, 2022
2021
IEEE Internet Things J., 2021
CoRR, 2021
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices.
CoRR, 2021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021
Proceedings of the IEEE Security and Privacy Workshops, 2021
2020
IEEE Trans. Ind. Informatics, 2020
One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2019
Removing epoxy underfill between neighbouring components using acid for component chip-off.
Digit. Investig., 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Gener. Comput. Syst., 2018
Forensic smartphone analysis using adhesives: Transplantation of Package on Package components.
Digit. Investig., 2018
E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
CoRR, 2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018
Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper.
Proceedings of the Information Security Theory and Practice, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
CoRR, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
Pervasive Mob. Comput., 2016
Future Gener. Comput. Syst., 2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016
CoRR, 2016
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016
CoRR, 2016
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 2016 IEEE International Conference on RFID, 2016
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
Proceedings of the New Codebreakers, 2016
2015
Inf. Sci., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Authentication based on a changeable biometric using gesture recognition with the Kinect™.
Proceedings of the International Conference on Biometrics, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
EURASIP J. Wirel. Commun. Netw., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
Editorial: advanced semantic and social multimedia technologies for future computing environment.
Multim. Tools Appl., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 2012 Information Security for South Africa, 2012
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing.
Int. J. Secur. Networks, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009
Proceedings of the Mobile Lightweight Wireless Systems, 2009
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Inf. Secur. Tech. Rep., 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.
Proceedings of the Smart Card Research and Advanced Applications, 2008
2007
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007
A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Problems and Prospects of Multi Application Smart cards in the UK Financial Industry.
Proceedings of ICEBE 2007, 2007
2006
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006
Secure Deployment of Applications to Fielded Devices and Smart Cards.
Proceedings of the Security in Information Systems, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Proceedings of the Security and Protection in Information Processing Systems, 2004
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.
Proceedings of the Communications and Multimedia Security, 2004
2003
Inf. Secur. Tech. Rep., 2003
2001
Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?
Proceedings of the Trusted Information: The New Decade Challenge, 2001
1999
Inf. Secur. Tech. Rep., 1999
Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards.
Proceedings of the Information and Communication Security, Second International Conference, 1999
Implementing a Secure Log File Download Manager for the Java Card.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
Proceedings of the Smart Card Research and Applications, This International Conference, 1998
1997
Proceedings of the Information Security, First International Workshop, 1997