The SCEAS System
Navigation Menu

Search the dblp DataBase


Keith Mayes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis
    Countermeasures for Attacks on Satellite TV Cards using Open Receivers. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:153-158 [Conf]
  2. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Design, Installation and Execution of a Security Agent for Mobile Stations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:1-15 [Conf]
  3. Michael Tunstall, Constantinos Markantonakis, Keith Mayes
    Inhibiting Card Sharing Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:239-251 [Conf]
  4. K. Papapanagiotou, Constantinos Markantonakis, Q. Zhang, William G. Sirett, Keith Mayes
    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:551-564 [Conf]
  5. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Secure Deployment of Applications to Fielded Devices and Smart Cards. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:195-206 [Conf]
  6. Q. Zhang, Constantinos Markantonakis, Keith Mayes
    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:20- [Conf]
  7. Kevin Eagles, Constantinos Markantonakis, Keith Mayes
    A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:161-174 [Conf]

  8. A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. [Citation Graph (, )][DBLP]

  9. Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery. [Citation Graph (, )][DBLP]

  10. Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. [Citation Graph (, )][DBLP]

  11. Firewall Mechanism in a User Centric Smart Card Ownership Model. [Citation Graph (, )][DBLP]

  12. Problems and Prospects of Multi Application Smart cards in the UK Financial Industry. [Citation Graph (, )][DBLP]

  13. Reading order independent grouping proof for RFID tags. [Citation Graph (, )][DBLP]

  14. Location Based Application Availability. [Citation Graph (, )][DBLP]

  15. Application Management Framework in User Centric Smart Card Ownership Model. [Citation Graph (, )][DBLP]

  16. Website Credential Storage and Two-Factor Web Authentication with a Java SIM. [Citation Graph (, )][DBLP]

  17. Select-Response Grouping Proof for RFID Tags. [Citation Graph (, )][DBLP]

  18. Confidence in smart token proximity: Relay attacks revisited. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002