Search

Your search keyword '"Markantonakis, Konstantinos"' showing total 555 results

Search Constraints

Start Over You searched for: Author "Markantonakis, Konstantinos" Remove constraint Author: "Markantonakis, Konstantinos"
555 results on '"Markantonakis, Konstantinos"'

Search Results

1. Control-Flow Attestation: Concepts, Solutions, and Open Challenges

2. A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery

4. Enclave Computing

5. Conclusion

11. Introduction

12. Investigating Black-Box Function Recognition Using Hardware Performance Counters

13. A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

14. A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices

15. Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

16. Return-Oriented Programming on RISC-V

17. LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

18. Deep Learning Application in Security and Privacy -- Theory and Practice: A Position Paper

19. An evaluation of the security of the Bitcoin Peer-to- Peer Network

20. E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

21. Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

22. Consumer Centric Data Control, Tracking and Transparency -- A Position Paper

23. Remote Credential Management with Mutual Attestation for Trusted Execution Environments

24. EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

25. Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

26. Serverless Protocols for Inventory and Tracking with a UAV

28. Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systems

29. A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

30. An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

31. Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

32. Challenges of Security and Trust of Mobile Devices as Digital Avionics Component

33. When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data

34. Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments

35. Remote Credential Management with Mutual Attestation for Trusted Execution Environments

36. Deep Learning Application in Security and Privacy – Theory and Practice: A Position Paper

37. Enhancing EMV Tokenisation with Dynamic Transaction Tokens

42. Philanthropy on the Blockchain

43. EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

44. A Secure and Trusted Channel Protocol for UAVs Fleets

45. May the Force Be with You: Force-Based Relay Attack Detection

48. Tokenisation Blacklisting Using Linkable Group Signatures

49. Proximity Assurances Based on Natural and Artificial Ambient Environments

50. An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

Catalog

Books, media, physical & digital resources