Raja Naeem Akram
Titre
Citée par
Citée par
Année
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy
FS Hardwick, A Gioulis, RN Akram, K Markantonakis
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
512018
A paradigm shift in smart card ownership model
RN Akram, K Markantonakis, K Mayes
2010 International Conference on Computational Science and Its Applications …, 2010
422010
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016
352016
Application management framework in user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
International Workshop on Information Security Applications, 20-35, 2009
282009
Security, privacy and safety evaluation of dynamic and static fleets of drones
RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ...
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017
222017
A dynamic and ubiquitous smart card security assurance and validation mechanism
RN Akram, K Markantonakis, K Mayes
IFIP International Information Security Conference, 161-172, 2010
222010
Trusted platform module for smart cards
RN Akram, K Markantonakis, K Mayes
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
212014
Pseudorandom number generation in smart cards: an implementation, performance and randomness analysis
RN Akram, K Markantonakis, K Mayes
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
202012
A privacy preserving application acquisition protocol
RN Akram, K Markantonakis, K Mayes
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
172012
Firewall mechanism in a user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
International Conference on Smart Card Research and Advanced Applications …, 2010
172010
Log your car: The non-invasive vehicle forensics
H Mansor, K Markantonakis, RN Akram, K Mayes, I Gurulian
2016 IEEE Trustcom/BigDataSE/ISPA, 974-982, 2016
162016
Philanthropy on the Blockchain
D Jayasinghe, S Cobourne, K Markantonakis, RN Akram, K Mayes
IFIP International Conference on Information Security Theory and Practice, 25-38, 2017
15*2017
User centric security model for tamper-resistant devices
RN Akram, K Markantonakis, K Mayes
2011 IEEE 8th International Conference on e-Business Engineering, 168-177, 2011
142011
The applicability of ambient sensors as proximity evidence for NFC transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, RN Akram, ...
2017 IEEE Security and Privacy Workshops (SPW), 179-188, 2017
132017
Towards trusted execution of multi-modal continuous authentication schemes
C Shepherd, RN Akram, K Markantonakis
Proceedings of the Symposium on Applied Computing, 1444-1451, 2017
132017
Preventing relay attacks in mobile transactions using infrared light
I Gurulian, RN Akram, K Markantonakis, K Mayes
Proceedings of the Symposium on Applied Computing, 1724-1731, 2017
132017
Challenges of security and trust in avionics wireless networks
RN Akram, K Markantonakis, R Holloway, S Kariyawasam, S Ayub, ...
2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 4B1-1-4B1-12, 2015
132015
Simulator problem in user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
132010
Binding hardware and software to prevent firmware modification and device counterfeiting
RP Lee, K Markantonakis, RN Akram
Proceedings of the 2nd ACM international workshop on cyber-physical system …, 2016
122016
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles
H Mansor, K Markantonakis, RN Akram, K Mayes
2015 10th International Conference on Availability, Reliability and Security …, 2015
122015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20