Now showing items 1-5 of 8

  • Consumer-centric protection for online social networks

    Akram, Raja Naeem; Ko, Ryan K.L.; Law, Tsz Fung (IEEE Computer Society, 2014)
    Online Social Networks (OSNs) are a unique construct that is shaped by the advancement and availability of Internet technologies. A large portion of internet users make use of OSN services to share and celebrate their ...
  • Digital trust - trusted computing and beyond: A position paper

    Akram, Raja Naeem; Ko, Ryan K.L. (IEEE Computer Society, 2015-01-15)
    Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust ...
  • Good vibrations: artificial ambience-based relay attack detection

    Gurulian, Iakovos; Markantonakis, Konstantinos; Frank, Eibe; Akram, Raja Naeem (IEEE Computer Society, 2018)
    Relay attacks are passive man in the middle attacks, aiming to extend the physical distance of devices involved in a transaction beyond their operating environment, within the restricted time-frame. In the field of ...
  • On the effectiveness of ambient sensing for detecting NFC Relay Attacks

    Gurulian, Iakovos; Shepherd, Carlton; Frank, Eibe; Markantonakis, Konstantinos; Akram, Raja Naeem; Mayes, Keith (IEEE, 2017)
    Smartphones with Near-Field Communication (NFC) may emulate contactless smart cards, which has resulted in the deployment of various access control, transportation and payment services, such as Google Pay and Apple Pay. ...
  • Proximity assurances based on natural and artificial ambient environments

    Gurulian, Iakovos; Markantonakis, Konstantinos; Shepherd, Carlton; Frank, Eibe; Akram, Raja Naeem (Spinger, 2017)
    Relay attacks are passive man-in-the-middle attacks that aim to extend the physical distance of devices involved in a transaction beyond their operating environment. In the field of smart cards, distance bounding protocols ...