Carlton Shepherd

Orcid: 0000-0002-7366-9034

According to our database1, Carlton Shepherd authored at least 28 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Investigating Black-Box Function Recognition Using Hardware Performance Counters.
IEEE Trans. Computers, July, 2023

A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery.
CoRR, 2023

2021
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles.
CoRR, 2021

Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices.
CoRR, 2021

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey.
CoRR, 2021

A DLT-based Smart Contract Architecture for Atomic and Scalable Trading.
CoRR, 2021

Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis.
Comput. Secur., 2021

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2019
Techniques for establishing trust in modern constrained sensing platforms with trusted execution environments.
PhD thesis, 2019

Providing Confidential Cloud-based Fall Detection from Remote Sensor Data Using Multi-Party Computation.
CoRR, 2019

Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication.
CoRR, 2019

Privacy-Enhancing Context Authentication from Location-Sensitive Data.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018

Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018

2017
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs.
Proceedings of the Information Security Theory and Practice, 2017

On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Exploratory Analysis of the Security Risks of the Internet of Things in Finance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Proximity Assurances Based on Natural and Artificial Ambient Environments.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Towards trusted execution of multi-modal continuous authentication schemes.
Proceedings of the Symposium on Applied Computing, 2017

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016

Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
BlobSnake: gamification of feature extraction for 'plug and play' human activity recognition.
Proceedings of the 2015 British HCI Conference, Lincoln, United Kingdom, July 13-17, 2015, 2015

2013
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy.
Proceedings of the Security Protocols XXI, 2013


  Loading...