Follow
Carlton Shepherd
Title
Cited by
Cited by
Year
Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
15th IEEE International Conference on Trust, Security and Privacy in …, 2016
762016
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th International Conference on Availability, Reliability and Security, 7, 2017
292017
On the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data
I Gurulian, C Shepherd, E Frank, K Markantonakis, R Akram, K Mayes
16th IEEE International Conference on Trust, Security and Privacy in …, 2017
23*2017
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, RN Akram, ...
IEEE Security & Privacy Workshops, 2017
21*2017
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
C Shepherd, RN Akram, K Markantonakis
11th IFIP International Conference on Information Security Theory and …, 2017
192017
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
C Shepherd, FAP Petitcolas, RN Akram, K Markantonakis
14th International Conference on Trust, Privacy & Security in Digital …, 2017
192017
Towards Trusted Execution of Multi-modal Continuous Authentication Schemes
C Shepherd, RN Akram, K Markantonakis
Proceedings of the 32nd Symposium on Applied Computing, 1444-1451, 2017
142017
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices
C Shepherd, K Markantonakis, GA Jaloyan
IEEE Security & Privacy Workshops, 2021
132021
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis
C Shepherd, K Markantonakis, N van Heijningen, D Aboulkassimi, ...
Computers & Security 111, 102471, 2021
102021
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy
F Hao, D Clarke, C Shepherd
Cambridge International Workshop on Security Protocols, 255-264, 2013
102013
Remote Credential Management with Mutual Attestation for Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th IFIP Interntional Conference on Information Security Theory and …, 2018
7*2018
Privacy-enhancing context authentication from location-sensitive data
P Mainali, C Shepherd, FAP Petitcolas
Proceedings of the 14th International Conference on Availability …, 2019
52019
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay
G Haken, K Markantonakis, I Gurulian, C Shepherd, RN Akram
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 21-32, 2017
52017
A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices
C Shepherd, J Kalbantner, B Semal, K Markantonakis
arXiv preprint arXiv:2110.06363, 2022
42022
Proximity assurances based on natural and artificial ambient environments
I Gurulian, K Markantonakis, C Shepherd, E Frank, RN Akram
International Conference for Information Technology and Communications, 83-103, 2017
42017
Privacy-enhancing fall detection from remote sensor data using multi-party computation
P Mainali, C Shepherd
Proceedings of the 14th International Conference on Availability …, 2019
22019
Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd
Royal Holloway, University Of London, 2019
22019
Investigating Black-Box Function Recognition Using Hardware Performance Counters
C Shepherd, B Semal, K Markantonakis
arXiv preprint arXiv:2204.11639, 2022
12022
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles
V Vagal, K Markantonakis, C Shepherd
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 1-7, 2021
2021
BlobSnake: gamification of feature extraction for'plug and play'human activity recognition
R Kirkham, C Shepherd, T Plötz
Proceedings of the 2015 British HCI Conference, 74-81, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–20