Keith Mayes

According to our database1, Keith Mayes
  • authored at least 106 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Reprint of "You can't touch this: Consumer-centric android application repackaging detection".
Future Generation Comp. Syst., 2018

2017
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones.
CoRR, 2017

On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Preventing relay attacks in mobile transactions using infrared light.
Proceedings of the Symposium on Applied Computing, 2017

Comparison of dynamic biometrie security characteristics against other biometrics.
Proceedings of the IEEE International Conference on Communications, 2017

Characterising a CPU fault attack model via run-time data analysis.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Artificial Ambient Environments for Proximity Critical Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
You can't touch this: Consumer-centric android application repackaging detection.
Future Generation Comp. Syst., 2016

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks.
CoRR, 2016

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016

Log Your Car: The Non-invasive Vehicle Forensics.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Extending EMV Tokenised Payments to Offline-Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Tokenisation Blacklisting Using Linkable Group Signatures.
Proceedings of the Security and Privacy in Communication Networks, 2016

Enhancing EMV Tokenisation with Dynamic Transaction Tokens.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Two rounds RFID grouping-proof protocol.
Proceedings of the 2016 IEEE International Conference on RFID, 2016

Log Your Car: Reliable Maintenance Services Record.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Enhancing EMV Online PIN Verification.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Let's Get Mobile: Secure FOTA for Automotive System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Authentication based on a changeable biometric using gesture recognition with the Kinect™.
Proceedings of the International Conference on Biometrics, 2015

Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Remote E-Voting Using the Smart Card Web Server.
IJSSE, 2014

CAN Bus Risk Analysis Revisit.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Trusted Platform Module for Smart Cards.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Precise Instruction-Level Side Channel Profiling of Embedded Processors.
Proceedings of the Information Security Practice and Experience, 2014

Optimistic Fair-Exchange with Anonymity for Bitcoin Users.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

Secure Improved Cloud-Based RFID Authentication Protocol.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

Ownership Management in the Context of the Internet of Things.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Practical Attacks on Virtual Worlds.
Proceedings of the Risks and Security of Internet and Systems, 2014

Verifying Software Integrity in Embedded Systems: A Side Channel Approach.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2014

Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Mobile Communication Security Controllers.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Information Security Best Practices.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to Smart Cards and RFIDs.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

Errata to: Secure Smart Embedded Devices, Platforms and Applications.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

The BIOS and Rootkits.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to Java Card Programming.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to the Trusted Platform Module and Mobile Trusted Module.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Card-Present Transactions on the Internet Using the Smart Card Web Server.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Virtual World Authentication Using the Smart Card Web Server.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems.
Proceedings of the Security and Privacy in Communication Networks, 2013

A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013

Using the Smart Card Web Server in Secure Branchless Banking.
Proceedings of the Network and System Security - 7th International Conference, 2013

A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Subscriber Centric Conditional Access System for Pay-TV Systems.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Recovering from a Lost Digital Wallet.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Vulnerability Analysis of a Commercial .NET Smart Card.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
A Privacy Preserving Application Acquisition Protocol.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012

Tag Group Authentication Using Bit-Collisions.
Proceedings of the 2012 Information Security for South Africa, 2012

Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Distributed e-voting using the Smart Card Web Server.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Considerations for mobile authentication in the Cloud.
Inf. Sec. Techn. Report, 2011

Select-response grouping proof and its verification protocol for RFID tags.
IJIIDS, 2011

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
IACR Cryptology ePrint Archive, 2011

Cross-Platform Application Sharing Mechanism.
Proceedings of the IEEE 10th International Conference on Trust, 2011

User Centric Security Model for Tamper-Resistant Devices.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Application-Binding Protocol in the User Centric Smart Card Ownership Model.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
The MIFARE Classic story.
Inf. Sec. Techn. Report, 2010

An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing.
IJSN, 2010

Practical NFC Peer-to-Peer Relay Attack using Mobile Phones.
IACR Cryptology ePrint Archive, 2010

Website Credential Storage and Two-Factor Web Authentication with a Java SIM.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

A location based security framework for authenticating mobile phones.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

A Paradigm Shift in Smart Card Ownership Model.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Simulator Problem in User Centric Smart Card Ownership Model.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Firewall Mechanism in a User Centric Smart Card Ownership Model.
Proceedings of the Smart Card Research and Advanced Application, 2010

A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Transport ticketing security and fraud controls.
Inf. Sec. Techn. Report, 2009

Attacking smart card systems: Theory and practice.
Inf. Sec. Techn. Report, 2009

Confidence in smart token proximity: Relay attacks revisited.
Computers & Security, 2009

Application Management Framework in User Centric Smart Card Ownership Model.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Location Based Application Availability.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009

Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Select-Response Grouping Proof for RFID Tags.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Mobile communication security controllers an evaluation paper.
Inf. Sec. Techn. Report, 2008

Reading order independent grouping proof for RFID tags.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Overview of Security Threats for Smart Cards in the Public Transport Industry.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Smart Card Security.
Proceedings of the Computational Intelligence in Information Assurance and Security, 2007

A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Problems and Prospects of Multi Application Smart cards in the UK Financial Industry.
Proceedings of ICEBE 2007, 2007

2006
On the potential of high density smart cards.
Inf. Sec. Techn. Report, 2006

A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

Secure Deployment of Applications to Fielded Devices and Smart Cards.
Proceedings of the Security in Information Systems, 2006

Inhibiting Card Sharing Attacks.
Proceedings of the Advances in Information and Computer Security, 2006

Design, Installation and Execution of a Security Agent for Mobile Stations.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Countermeasures for Attacks on Satellite TV Cards using Open Receivers.
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005

2004
A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptography.
Proceedings of the Communications and Multimedia Security, 2004

2003
Are we smart about security?
Inf. Sec. Techn. Report, 2003

An overview of the GlobalPlatform smart card specification.
Inf. Sec. Techn. Report, 2003


  Loading...