Raja Naeem Akram

Orcid: 0000-0002-2789-4628

Affiliations:
  • Royal Holloway, University of London, Egham, UK


According to our database1, Raja Naeem Akram authored at least 87 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Return-Oriented Programming on RISC-V.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2019

Removing epoxy underfill between neighbouring components using acid for component chip-off.
Digit. Investig., 2019

Location Tracking Using Smartphone Accelerometer and Magnetometer Traces.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Security, privacy and trust of user-centric solutions.
Future Gener. Comput. Syst., 2018

E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
CoRR, 2018

Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs.
CoRR, 2018

Remote Credential Management with Mutual Attestation for Trusted Execution Environments.
Proceedings of the Information Security Theory and Practice, 2018

Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper.
Proceedings of the Information Security Theory and Practice, 2018

Consumer Centric Data Control, Tracking and Transparency - A Position Paper.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Good Vibrations: Artificial Ambience-Based Relay Attack Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Evaluation of the Security of the Bitcoin Peer-To-Peer Network.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

2017
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones.
CoRR, 2017

Serverless Protocols for Inventory and Tracking with a UAV.
CoRR, 2017

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs.
Proceedings of the Information Security Theory and Practice, 2017

Philanthropy on the Blockchain.
Proceedings of the Information Security Theory and Practice, 2017

A Secure and Trusted Channel Protocol for UAVs Fleets.
Proceedings of the Information Security Theory and Practice, 2017

On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Exploratory Analysis of the Security Risks of the Internet of Things in Finance.
Proceedings of the Trust, Privacy and Security in Digital Business, 2017

The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Proximity Assurances Based on Natural and Artificial Ambient Environments.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Towards trusted execution of multi-modal continuous authentication schemes.
Proceedings of the Symposium on Applied Computing, 2017

Preventing relay attacks in mobile transactions using infrared light.
Proceedings of the Symposium on Applied Computing, 2017

Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

May the Force Be with You: Force-Based Relay Attack Detection.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Provisioning Software with Hardware-Software Binding.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Artificial Ambient Environments for Proximity Critical Applications.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

Application Development Environments for Java and SIM Toolkit.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Smart Card Reader and Mobile APIs.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Multi-Application Smart Card Platforms and Operating Systems.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
Recovering from a lost digital wallet: A smart cards perspective extended abstract.
Pervasive Mob. Comput., 2016

When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data.
CoRR, 2016

An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks.
CoRR, 2016

Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks.
CoRR, 2016

Challenges of Security and Trust of Mobile Devices as Digital Avionics Component.
CoRR, 2016

Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments.
CoRR, 2016

Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Log Your Car: The Non-invasive Vehicle Forensics.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Extending EMV Tokenised Payments to Offline-Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing EMV Tokenisation with Dynamic Transaction Tokens.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Can You Call the Software in Your Device be Firmware?
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016

Log Your Car: Reliable Maintenance Services Record.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Secure Application Execution in Mobile Devices.
Proceedings of the New Codebreakers, 2016

2015
A novel consumer-centric card management architecture and potential security issues.
Inf. Sci., 2015

Enhancing EMV Online PIN Verification.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Secure and Trusted Application Execution on Embedded Devices.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2015

Let's Get Mobile: Secure FOTA for Automotive System.
Proceedings of the Network and System Security - 9th International Conference, 2015

Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks.
Proceedings of the Computer Security - ESORICS 2015, 2015

Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
End-to-End Secure and Privacy Preserving Mobile Chat Application.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Digital Trust - Trusted Computing and Beyond: A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Unified Model for Data Security - A Position Paper.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Trusted Platform Module for Smart Cards.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Consumer-centric protection for online social networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Rethinking the Smart Card Technology.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2014

An Introduction to Java Card Programming.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

An Introduction to the Trusted Platform Module and Mobile Trusted Module.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2013

Smart cards: State-of-the-art to future directions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2013

Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Subscriber Centric Conditional Access System for Pay-TV Systems.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

Recovering from a Lost Digital Wallet.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
A user centric security model for tamper-resistant devices.
PhD thesis, 2012

A Privacy Preserving Application Acquisition Protocol.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis.
Proceedings of the 5th International Conference on New Technologies, 2012

Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Cross-Platform Application Sharing Mechanism.
Proceedings of the IEEE 10th International Conference on Trust, 2011

User Centric Security Model for Tamper-Resistant Devices.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

Application-Binding Protocol in the User Centric Smart Card Ownership Model.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

A Paradigm Shift in Smart Card Ownership Model.
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010

Simulator Problem in User Centric Smart Card Ownership Model.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Firewall Mechanism in a User Centric Smart Card Ownership Model.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Application Management Framework in User Centric Smart Card Ownership Model.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Location Based Application Availability.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009


  Loading...