![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2024
- Yizhou Shen
, Carlton Shepherd, Chuadhry Mujeeb Ahmed, Shigen Shen
, Xiaoping Wu, Wenlong Ke
, Shui Yu:
Game-theoretic analytics for privacy preservation in Internet of Things networks: A survey. Eng. Appl. Artif. Intell. 133: 108449 (2024) - 2023
- Carlton Shepherd
, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. IEEE Trans. Computers 72(7): 2065-2079 (2023) - Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. TrustCom 2023: 549-558 - Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. CoRR abs/2308.00437 (2023) - 2022
- Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis:
Investigating Black-Box Function Recognition Using Hardware Performance Counters. CoRR abs/2204.11639 (2022) - 2021
- Carlton Shepherd
, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine
, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Comput. Secur. 111: 102471 (2021) - Fernando Rodriguez-Morales
, Jilu Li
, Daniel Gomez-Garcia Alvestegui
, Jiaxuan Shang
, Emily J. Arnold
, Carlton J. Leuschen
, Christopher F. Larsen
, Andrew Shepherd
, Sine Munk Hvidegaard
, René Forsberg
:
A Compact, Reconfigurable, Multi-UWB Radar for Snow Thickness Evaluation and Altimetry: Development and Field Trials. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 6755-6765 (2021) - Fernando Rodriguez-Morales, Jilu Li
, Daniel Gomez-Garcia Alvestegui
, Jiaxuan Shang, Emily J. Arnold
, Carlton J. Leuschen
, Christopher F. Larsen, Andrew Shepherd, Sine Munk Hvidegaard
, René Forsberg
:
Correction to "A Compact, Reconfigurable, Multi-UWB Radar for Snow Thickness Evaluation and Altimetry: Development and Field Trials". IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 8729 (2021) - Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. SP (Workshops) 2021: 221-227 - Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan:
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices. CoRR abs/2102.08804 (2021) - Jan Kalbantner
, Konstantinos Markantonakis, D. Hurley-Smith, Carlton Shepherd, Benjamin Semal:
A DLT-based Smart Contract Architecture for Atomic and Scalable Trading. CoRR abs/2105.02937 (2021) - Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache:
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Survey. CoRR abs/2105.04454 (2021) - Carlton Shepherd, Jan Kalbantner, Benjamin Semal, Konstantinos Markantonakis:
Exploiting Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices. CoRR abs/2110.06363 (2021) - Vihangi Vagal, Konstantinos Markantonakis, Carlton Shepherd:
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles. CoRR abs/2110.09453 (2021) - 2019
- Carlton Shepherd:
Techniques for establishing trust in modern constrained sensing platforms with trusted execution environments. Royal Holloway, University of London, Egham, UK, 2019 - Pradip Mainali, Carlton Shepherd:
Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation. ARES 2019: 73:1-73:10 - Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas
:
Privacy-Enhancing Context Authentication from Location-Sensitive Data. ARES 2019: 87:1-87:10 - Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas:
Enhancing the Privacy and Computability of Location-Sensitive Data for Context Authentication. CoRR abs/1904.08800 (2019) - Pradip Mainali, Carlton Shepherd:
Providing Confidential Cloud-based Fall Detection from Remote Sensor Data Using Multi-Party Computation. CoRR abs/1904.09896 (2019) - 2018
- Carlton Shepherd, Raja Naeem Akram
, Konstantinos Markantonakis:
Remote Credential Management with Mutual Attestation for Trusted Execution Environments. WISTP 2018: 157-173 - Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
Secure Remote Credential Management with Mutual Attestation for Constrained Sensing Platforms with TEEs. CoRR abs/1804.10707 (2018) - 2017
- Carlton Shepherd, Raja Naeem Akram
, Konstantinos Markantonakis:
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments. ARES 2017: 7:1-7:10 - Gareth Haken, Konstantinos Markantonakis, Iakovos Gurulian, Carlton Shepherd, Raja Naeem Akram
:
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. CPSS@AsiaCCS 2017: 21-32 - Carlton Shepherd, Raja Naeem Akram
, Konstantinos Markantonakis:
Towards trusted execution of multi-modal continuous authentication schemes. SAC 2017: 1444-1451 - Iakovos Gurulian, Konstantinos Markantonakis, Carlton Shepherd, Eibe Frank, Raja Naeem Akram:
Proximity Assurances Based on Natural and Artificial Ambient Environments. SECITC 2017: 83-103 - Carlton Shepherd, Iakovos Gurulian, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram
, Emmanouil Panaousis
, Keith Mayes:
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions. IEEE Symposium on Security and Privacy Workshops 2017: 179-188 - Carlton Shepherd, Fabien A. P. Petitcolas
, Raja Naeem Akram
, Konstantinos Markantonakis:
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance. TrustBus 2017: 164-179 - Iakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram
, Keith Mayes:
On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks. TrustCom/BigDataSE/ICESS 2017: 41-49 - Carlton Shepherd, Raja Naeem Akram
, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. WISTP 2017: 75-92 - Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. CoRR abs/1712.03943 (2017)
skipping 5 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-17 16:10 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint