Follow
Carlton Shepherd
Title
Cited by
Cited by
Year
Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
15th IEEE International Conference on Trust, Security and Privacy in …, 2016
1012016
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th International Conference on Availability, Reliability and Security, 7, 2017
442017
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis
C Shepherd, K Markantonakis, N van Heijningen, D Aboulkassimi, ...
Computers & Security 111, 102471, 2021
402021
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
C Shepherd, RN Akram, K Markantonakis
11th IFIP International Conference on Information Security Theory and …, 2017
282017
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices
C Shepherd, K Markantonakis, GA Jaloyan
IEEE Security & Privacy Workshops, 2021
262021
On the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data
I Gurulian, C Shepherd, E Frank, K Markantonakis, R Akram, K Mayes
16th IEEE International Conference on Trust, Security and Privacy in …, 2017
25*2017
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
C Shepherd, FAP Petitcolas, RN Akram, K Markantonakis
14th International Conference on Trust, Privacy & Security in Digital …, 2017
242017
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, RN Akram, ...
IEEE Security & Privacy Workshops, 2017
22*2017
Towards Trusted Execution of Multi-modal Continuous Authentication Schemes
C Shepherd, RN Akram, K Markantonakis
Proceedings of the 32nd Symposium on Applied Computing, 1444-1451, 2017
162017
Remote Credential Management with Mutual Attestation for Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th IFIP Interntional Conference on Information Security Theory and …, 2018
112018
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy
F Hao, D Clarke, C Shepherd
Cambridge International Workshop on Security Protocols, 255-264, 2013
112013
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay
G Haken, K Markantonakis, I Gurulian, C Shepherd, RN Akram
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 21-32, 2017
72017
Privacy-enhancing fall detection from remote sensor data using multi-party computation
P Mainali, C Shepherd
Proceedings of the 14th International Conference on Availability …, 2019
52019
Privacy-enhancing context authentication from location-sensitive data
P Mainali, C Shepherd, FAP Petitcolas
Proceedings of the 14th International Conference on Availability …, 2019
52019
A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices
C Shepherd, J Kalbantner, B Semal, K Markantonakis
IEEE Transactions on Dependable and Secure Computing, 2023
4*2023
Proximity assurances based on natural and artificial ambient environments
I Gurulian, K Markantonakis, C Shepherd, E Frank, RN Akram
Innovative Security Solutions for Information Technology and Communications …, 2017
42017
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles
V Vagal, K Markantonakis, C Shepherd
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 1-7, 2021
32021
Comparative DQN-improved algorithms for stochastic games-based automated edge intelligence-enabled IoT malware spread-suppression strategies
Y Shen, C Shepherd, CM Ahmed, S Yu, T Li
IEEE Internet of Things Journal, 2024
22024
Investigating Black-Box Function Recognition Using Hardware Performance Counters
C Shepherd, B Semal, K Markantonakis
IEEE Transactions on Computers, 2022
22022
Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd
Royal Holloway, University Of London, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20