The SCEAS System
Navigation Menu

Search the dblp DataBase


Constantinos Markantonakis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Lishoy Francis, William G. Sirett, Keith Mayes, Constantinos Markantonakis
    Countermeasures for Attacks on Satellite TV Cards using Open Receivers. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2005, pp:153-158 [Conf]
  2. Constantinos Markantonakis
    Secure Log File Download Mechanisms for Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:285-304 [Conf]
  3. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Design, Installation and Execution of a Security Agent for Mobile Stations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:1-15 [Conf]
  4. Constantinos Markantonakis, Simeon Xenitellis
    Implementing a Secure Log File Download Manager for the Java Card. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:143-162 [Conf]
  5. Constantinos Markantonakis
    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:230-243 [Conf]
  6. Constantinos Markantonakis
    The Case for a Secure Multi-Application Smart Card Operating System. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:188-197 [Conf]
  7. Michael Tunstall, Constantinos Markantonakis, Keith Mayes
    Inhibiting Card Sharing Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:239-251 [Conf]
  8. Constantinos Markantonakis
    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck? [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:77-92 [Conf]
  9. K. Papapanagiotou, Constantinos Markantonakis, Q. Zhang, William G. Sirett, Keith Mayes
    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:551-564 [Conf]
  10. Konstantinos Rantos, Constantinos Markantonakis
    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:351-366 [Conf]
  11. William G. Sirett, John A. MacDonald, Keith Mayes, Constantinos Markantonakis
    Secure Deployment of Applications to Fielded Devices and Smart Cards. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:195-206 [Conf]
  12. Q. Zhang, Constantinos Markantonakis, Keith Mayes
    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:20- [Conf]
  13. Kevin Eagles, Constantinos Markantonakis, Keith Mayes
    A Comparative Analysis of Common Threats, Vulnerabilities, Attacks and Countermeasures Within Smart Card and Wireless Sensor Network Node Technologies. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:161-174 [Conf]

  14. Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence. [Citation Graph (, )][DBLP]

  15. Problems and Prospects of Multi Application Smart cards in the UK Financial Industry. [Citation Graph (, )][DBLP]

  16. A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002