default search action
Iakovos Gurulian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Konstantinos Markantonakis, Julia A. Meister, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram, Sarah Hani Abu Ghazalah, Mumraiz Kasi, Damien Sauveron, Gerhard P. Hancke:
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access 12: 150372-150386 (2024)
2010 – 2019
- 2019
- [b1]Iakovos Gurulian:
On enhancing the security of time constrained mobile contactless transactions. Royal Holloway, University of London, Egham, UK, 2019 - 2018
- [j2]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
Reprint of "You can't touch this: Consumer-centric android application repackaging detection". Future Gener. Comput. Syst. 80: 537-545 (2018) - [c13]Iakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram:
Good Vibrations: Artificial Ambience-Based Relay Attack Detection. TrustCom/BigDataSE 2018: 481-489 - 2017
- [c12]Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Artificial Ambient Environments for Proximity Critical Applications. ARES 2017: 5:1-5:10 - [c11]Iakovos Gurulian, Gerhard P. Hancke, Konstantinos Markantonakis, Raja Naeem Akram:
May the Force Be with You: Force-Based Relay Attack Detection. CARDIS 2017: 142-159 - [c10]Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram:
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. CPSS@AsiaCCS 2017: 21-32 - [c9]Iakovos Gurulian, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Preventing relay attacks in mobile transactions using infrared light. SAC 2017: 1724-1731 - [c8]Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram:
Proximity Assurances Based on Natural and Artificial Ambient Environments. SECITC 2017: 83-103 - [c7]Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Emmanouil Panaousis, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - [c6]Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - 2016
- [j1]Iakovos Gurulian, Konstantinos Markantonakis, Lorenzo Cavallaro, Keith Mayes:
You can't touch this: Consumer-centric android application repackaging detection. Future Gener. Comput. Syst. 65: 1-9 (2016) - [c5]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: Reliable Maintenance Services Record. Inscrypt 2016: 484-504 - [c4]Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis:
Tokenisation Blacklisting Using Linkable Group Signatures. SecureComm 2016: 182-198 - [c3]Carlton Shepherd, Ghada Arfaoui, Iakovos Gurulian, Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram, Damien Sauveron, Emmanuel Conchon:
Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems. Trustcom/BigDataSE/ISPA 2016: 168-177 - [c2]Danushka Jayasinghe, Konstantinos Markantonakis, Iakovos Gurulian, Raja Naeem Akram, Keith Mayes:
Extending EMV Tokenised Payments to Offline-Environments. Trustcom/BigDataSE/ISPA 2016: 443-450 - [c1]Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian:
Log Your Car: The Non-invasive Vehicle Forensics. Trustcom/BigDataSE/ISPA 2016: 974-982 - [i2]Raja Naeem Akram, Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Keith Mayes:
Empirical Evaluation of Ambient Sensors as Proximity Detection Mechanism for Mobile Payments. CoRR abs/1601.07101 (2016) - [i1]Iakovos Gurulian, Carlton Shepherd, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
When Theory and Reality Collide: Demystifying the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data. CoRR abs/1605.00425 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint