Konstantinos Markantonakis
Konstantinos Markantonakis
Professor of Information Security
Verified email at rhul.ac.uk - Homepage
TitleCited byYear
Practical NFC peer-to-peer relay attack using mobile phones
L Francis, G Hancke, K Mayes, K Markantonakis
International Workshop on Radio Frequency Identification: Security and …, 2010
2292010
Smart cards, tokens, security and applications
KE Mayes, K Markantonakis
Springer 2 (3), 4, 2008
2052008
Smart cards, tokens, security and applications
KE Mayes, K Markantonakis
Springer 2 (3), 4, 2008
2012008
Confidence in smart token proximity: Relay attacks revisited
GP Hancke, KE Mayes, K Markantonakis
Computers & Security 28 (7), 615-627, 2009
1202009
Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
L Francis, GP Hancke, K Mayes, K Markantonakis
IACR Cryptology ePrint Archive 2011, 618, 2011
1182011
HB-MP+ Protocol: An Improvement on the HB-MP Protocol
X Leng, K Mayes, K Markantonakis
2008 IEEE international conference on RFID, 118-124, 2008
872008
Security challenges for user-oriented RFID applications within the" Internet of things"
GP Hancke, K Markantonakis, KE Mayes
網際網路技術學刊 11 (3), 307-313, 2010
702010
Attacking smart card systems: Theory and practice
K Markantonakis, M Tunstall, G Hancke, I Askoxylakis, K Mayes
information security technical report 14 (2), 46-56, 2009
642009
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms
L Francis, G Hancke, K Mayes, K Markantonakis
2009 International Conference for Internet Technology and Secured …, 2009
462009
A paradigm shift in smart card ownership model
RN Akram, K Markantonakis, K Mayes
2010 International Conference on Computational Science and Its Applications …, 2010
422010
Practical relay attack on contactless transactions by using nfc mobile phones
K Markantonakis, L Francis, G Hancke, K Mayes
Radio Frequency Identification System Security: RFIDsec 12, 21, 2012
302012
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016
292016
A Secure Channel protocol for multi-application smart cards based on public key cryptography
K Markantonakis, K Mayes
Communications and Multimedia Security, 79-95, 2005
292005
Precise instruction-level side channel profiling of embedded processors
M Msgna, K Markantonakis, K Mayes
International Conference on Information Security Practice and Experience …, 2014
282014
A practical fair-exchange e-payment protocol for anonymous purchase and physical delivery
Q Zhang, K Markantonakis, K Mayes
IEEE International Conference on Computer Systems and Applications, 2006 …, 2006
282006
E-Voting with blockchain: an E-Voting protocol with decentralisation and voter privacy
FS Hardwick, A Gioulis, RN Akram, K Markantonakis
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
272018
Application management framework in user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
International Workshop on Information Security Applications, 20-35, 2009
252009
Application management framework in user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
International Workshop on Information Security Applications, 20-35, 2009
252009
The case for a secure multi-application smart card operating system
C Markantonakis
Information Security, 188-197, 1998
241998
Secure improved cloud-based RFID authentication protocol
S Abughazalah, K Markantonakis, K Mayes
Data Privacy Management, Autonomous Spontaneous Security, and Security …, 2014
222014
The system can't perform the operation now. Try again later.
Articles 1–20