default search action
Raja Naeem Akram
Person information
- affiliation: Royal Holloway, University of London, Egham, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Konstantinos Markantonakis, Julia A. Meister, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram, Sarah Hani Abu Ghazalah, Mumraiz Kasi, Damien Sauveron, Gerhard P. Hancke:
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access 12: 150372-150386 (2024) - 2021
- [i15]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. CoRR abs/2103.08229 (2021) - 2020
- [c67]Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service. ACNS Workshops 2020: 360-377 - [c66]Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja Naeem Akram, David Robin, Keith Mayes, David Naccache:
Return-Oriented Programming on RISC-V. AsiaCCS 2020: 471-480 - [c65]Benjamin Semal, Konstantinos Markantonakis, Raja Naeem Akram, Jan Kalbantner:
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems. SEC 2020: 3-16
2010 – 2019
- 2019
- [j5]Thibaut Heckmann, James P. McEvoy, Konstantinos Markantonakis, Raja Naeem Akram, David Naccache:
Removing epoxy underfill between neighbouring components using acid for component chip-off. Digit. Investig. 29: 198-209 (2019) - [j4]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Ensuring Secure Application Execution and Platform-Specific Execution in Embedded Devices. ACM Trans. Embed. Comput. Syst. 18(3): 26:1-26:21 (2019) - [c64]Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins:
Location Tracking Using Smartphone Accelerometer and Magnetometer Traces. ARES 2019: 96:1-96:9 - 2018
- [j3]Raja Naeem Akram, Hsiao-Hwa Chen, Javier López, Damien Sauveron, Laurence T. Yang:
Security, privacy and trust of user-centric solutions. Future Gener. Comput. Syst. 80: 417-420 (2018) - [c63]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
An Evaluation of the Security of the Bitcoin Peer-To-Peer Network. iThings/GreenCom/CPSCom/SmartData 2018: 1057-1062 - [c62]Freya Sheer Hardwick, Apostolos Gioulis, Raja Naeem Akram, Konstantinos Markantonakis:
E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. iThings/GreenCom/CPSCom/SmartData 2018: 1561-1567 - [c61]Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. TrustCom/BigDataSE 2018: 481-489 - [c60]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open Governance. TrustCom/BigDataSE 2018: 1342-1347 - [c59]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. TrustCom/BigDataSE 2018: 1380-1385 - [c58]Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis:
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. WISTP 2018: 129-144 - [c57]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Remote Credential Management with Mutual Attestation for Trusted Execution Environments. WISTP 2018: 157-173 - [i14]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs. CoRR abs/1804.10707 (2018) - [i13]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
Consumer Centric Data Control, Tracking and Transparency - A Position Paper. CoRR abs/1805.04747 (2018) - [i12]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance. CoRR abs/1805.05844 (2018) - [i11]Freya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis:
E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy. CoRR abs/1805.10258 (2018) - [i10]James Tapsell, Raja Naeem Akram, Konstantinos Markantonakis:
An evaluation of the security of the Bitcoin Peer-to- Peer Network. CoRR abs/1805.10259 (2018) - [i9]Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis:
Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper. CoRR abs/1812.00190 (2018) - 2017
- [c56]Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. ARES 2017: 5:1-5:10 - [c55]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. ARES 2017: 7:1-7:10 - [c54]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Provisioning Software with Hardware-Software Binding. ARES 2017: 49:1-49:9 - [c53]Iakovos Gurulian, Gerhard P. Hancke, Konstantinos Markantonakis, Raja Naeem Akram:
May the Force Be with You: Force-Based Relay Attack Detection. CARDIS 2017: 142-159 - [c52]Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram:
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. CPSS@AsiaCCS 2017: 21-32 - [c51]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Towards trusted execution of multi-modal continuous authentication schemes. SAC 2017: 1444-1451 - [c50]Iakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Preventing relay attacks in mobile transactions using infrared light. SAC 2017: 1724-1731 - [c49]Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram:
Proximity Assurances Based on Natural and Artificial Ambient Environments. SECITC 2017: 83-103 - [c48]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c47]Carlton Shepherd, Fabien A. P. Petitcolas, Raja Naeem Akram, Konstantinos Markantonakis:
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. TrustBus 2017: 164-179 - [c46]Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - [c45]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette:
A Secure and Trusted Channel Protocol for UAVs Fleets. WISTP 2017: 3-24 - [c44]Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Philanthropy on the Blockchain. WISTP 2017: 25-38 - [c43]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. WISTP 2017: 75-92 - [p5]Konstantinos Markantonakis, Raja Naeem Akram:
Multi-Application Smart Card Platforms and Operating Systems. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 59-92 - [p4]Gary Waite, Keith Mayes, Raja Naeem Akram:
Application Development Environments for Java and SIM Toolkit. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 253-281 - [p3]Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis:
Smart Card Reader and Mobile APIs. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 305-349 - [i8]Collins Mtita, Maryline Laurent, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Serge Chaumette:
Serverless Protocols for Inventory and Tracking with a UAV. CoRR abs/1708.05417 (2017) - [i7]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge Chaumette:
Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones. CoRR abs/1708.05732 (2017) - [i6]Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. CoRR abs/1712.03943 (2017) - 2016
- [j2]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
Recovering from a lost digital wallet: A smart cards perspective extended abstract. Pervasive Mob. Comput. 29: 113-129 (2016) - [c42]Mehari G. Msgna, Houda Ferradi, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Application Execution in Mobile Devices. The New Codebreakers 2016: 417-438 - [c41]Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram:
Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting. CPSS@AsiaCCS 2016: 70-81 - [c40]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. Inscrypt 2016: 484-504 - [c39]Rashedul Hassan, Konstantinos Markantonakis, Raja Naeem Akram:
Can You Call the Software in Your Device be Firmware? ICEBE 2016: 188-195 - [c38]Danushka Jayasinghe, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Enhancing EMV Tokenisation with Dynamic Transaction Tokens. RFIDSec 2016: 107-122 - [c37]Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. Trustcom/BigDataSE/ISPA 2016: 168-177 - [c36]Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. Trustcom/BigDataSE/ISPA 2016: 443-450 - [c35]Raja Naeem Akram, Pierre-François Bonnefoi, Serge Chaumette, Konstantinos Markantonakis, Damien Sauveron:
Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements. Trustcom/BigDataSE/ISPA 2016: 606-614 - [c34]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. Trustcom/BigDataSE/ISPA 2016: 974-982 - [i5]Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes:
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments. CoRR abs/1601.07101 (2016) - [i4]Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. CoRR abs/1605.00425 (2016) - [i3]Raja Naeem Akram, Konstantinos Markantonakis:
Challenges of Security and Trust of Mobile Devices as Digital Avionics Component. CoRR abs/1605.00446 (2016) - [i2]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks. CoRR abs/1608.04115 (2016) - [i1]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Damien Sauveron, Serge Chaumette:
An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks. CoRR abs/1608.04116 (2016) - 2015
- [j1]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
A novel consumer-centric card management architecture and potential security issues. Inf. Sci. 321: 150-161 (2015) - [c33]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. ARES 2015: 139-148 - [c32]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks. ESORICS (2) 2015: 541-560 - [c31]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Let's Get Mobile: Secure FOTA for Automotive System. NSS 2015: 503-510 - [c30]Konstantinos Markantonakis, Raja Naeem Akram, Mehari G. Msgna:
Secure and Trusted Application Execution on Embedded Devices. SECITC 2015: 3-24 - [c29]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, Keith Mayes:
Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their Countermeasures. TrustCom/BigDataSE/ISPA (1) 2015: 483-490 - [c28]Pierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis:
A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. TrustCom/BigDataSE/ISPA (1) 2015: 612-620 - [c27]Danushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes:
Enhancing EMV Online PIN Verification. TrustCom/BigDataSE/ISPA (1) 2015: 808-817 - [e1]Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6 [contents] - 2014
- [c26]Raja Naeem Akram, Konstantinos Markantonakis:
Rethinking the Smart Card Technology. HCI (24) 2014: 221-232 - [c25]Raja Naeem Akram, Ryan K. L. Ko, Tsz Fung Law:
Consumer-centric protection for online social networks. IRI 2014: 62-67 - [c24]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Trusted Platform Module for Smart Cards. NTMS 2014: 1-5 - [c23]Raja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron:
Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager. TrustCom 2014: 448-456 - [c22]Raja Naeem Akram, Ryan K. L. Ko:
Unified Model for Data Security - A Position Paper. TrustCom 2014: 831-839 - [c21]Raja Naeem Akram, Ryan K. L. Ko:
Digital Trust - Trusted Computing and Beyond: A Position Paper. TrustCom 2014: 884-892 - [c20]Raja Naeem Akram, Ryan K. L. Ko:
End-to-End Secure and Privacy Preserving Mobile Chat Application. WISTP 2014: 124-139 - [p2]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to the Trusted Platform Module and Mobile Trusted Module. Secure Smart Embedded Devices, Platforms and Applications 2014: 71-93 - [p1]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
An Introduction to Java Card Programming. Secure Smart Embedded Devices, Platforms and Applications 2014: 497-513 - 2013
- [c19]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Recovering from a Lost Digital Wallet. HPCC/EUC 2013: 1615-1621 - [c18]Mehari Msgna, Konstantinos Markantonakis, Keith Mayes, Raja Naeem Akram:
Subscriber Centric Conditional Access System for Pay-TV Systems. ICEBE 2013: 450-455 - [c17]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for User Centric Smart Cards Using Pseudorandom Number Generators. ICICS 2013: 151-166 - [c16]Raja Naeem Akram, Konstantinos Markantonakis:
Smart cards: State-of-the-art to future directions. ISSPIT 2013: 154-162 - [c15]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Remote Attestation Mechanism for Embedded Devices Based on Physical Unclonable Functions. RFIDSec Asia 2013: 107-121 - [c14]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. TrustCom/ISPA/IUCC 2013: 336-345 - 2012
- [b1]Raja Naeem Akram:
A user centric security model for tamper-resistant devices. Royal Holloway, University of London, UK, 2012 - [c13]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Building the Bridges - A Proposal for Merging Different Paradigms in Mobile NFC Ecosystem. CIS 2012: 646-652 - [c12]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Coopetitive Architecture to Support a Dynamic and Scalable NFC Based Mobile Services Architecture. ICICS 2012: 214-227 - [c11]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. NTMS 2012: 1-7 - [c10]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Privacy Preserving Application Acquisition Protocol. TrustCom 2012: 383-392 - 2011
- [c9]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application-Binding Protocol in the User Centric Smart Card Ownership Model. ACISP 2011: 208-225 - [c8]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
User Centric Security Model for Tamper-Resistant Devices. ICEBE 2011: 168-177 - [c7]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Cross-Platform Application Sharing Mechanism. TrustCom 2011: 597-605 - 2010
- [c6]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Firewall Mechanism in a User Centric Smart Card Ownership Model. CARDIS 2010: 118-132 - [c5]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Simulator Problem in User Centric Smart Card Ownership Model. EUC 2010: 679-686 - [c4]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Paradigm Shift in Smart Card Ownership Model. ICCSA Workshops 2010: 191-200 - [c3]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism. SEC 2010: 161-172
2000 – 2009
- 2009
- [c2]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Location Based Application Availability. OTM Workshops 2009: 128-138 - [c1]Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application Management Framework in User Centric Smart Card Ownership Model. WISA 2009: 20-35
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint