Raja Naeem Akram
Orcid: 0000-0002-2789-4628Affiliations:
- Royal Holloway, University of London, Egham, UK
According to our database1,
Raja Naeem Akram
authored at least 88 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on rnakram.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024
2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2019
Removing epoxy underfill between neighbouring components using acid for component chip-off.
Digit. Investig., 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Future Gener. Comput. Syst., 2018
E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
CoRR, 2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018
Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper.
Proceedings of the Information Security Theory and Practice, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
2017
CoRR, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the Information Security Theory and Practice, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust, Privacy and Security in Digital Business, 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Symposium on Applied Computing, 2017
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
Pervasive Mob. Comput., 2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016
CoRR, 2016
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016
CoRR, 2016
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
Proceedings of the New Codebreakers, 2016
2015
Inf. Sci., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014
2013
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009