Carlton Shepherd

According to our database1, Carlton Shepherd
  • authored at least 13 papers between 2013 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs.
CoRR, 2017

On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Exploratory Analysis of the Security Risks of the Internet of Things in Finance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Proximity Assurances Based on Natural and Artificial Ambient Environments.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Towards trusted execution of multi-modal continuous authentication schemes.
Proceedings of the Symposium on Applied Computing, 2017

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016

Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
BlobSnake: gamification of feature extraction for 'plug and play' human activity recognition.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2013
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.
Proceedings of the Security Protocols XXI, 2013


  Loading...