Iakovos Gurulian

According to our database1, Iakovos Gurulian authored at least 15 papers between 2016 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Generation Comp. Syst., 2018

Good Vibrations: Artificial Ambience-Based Relay Attack Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Proximity Assurances Based on Natural and Artificial Ambient Environments.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Preventing relay attacks in mobile transactions using infrared light.
Proceedings of the Symposium on Applied Computing, 2017

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

May the Force Be with You: Force-Based Relay Attack Detection.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Artificial Ambient Environments for Proximity Critical Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
You can't touch this: Consumer-centric android application repackaging detection.
Future Generation Comp. Syst., 2016

Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Log Your Car: The Non-invasive Vehicle Forensics.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Extending EMV Tokenised Payments to Offline-Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Tokenisation Blacklisting Using Linkable Group Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2016

Log Your Car: Reliable Maintenance Services Record.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...