Skip to main content

Research Repository

Advanced Search

All Outputs (4)

Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. (2012)
Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012). Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. In K. P. Chow, & L. Hui (Eds.), Information and Communications Security: 14th International Conference, ICICS 2012, Proceedings (214-227). https://doi.org/10.1007/978-3-642-34129-8_19

Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (ICOM) referred as Trusted Service Manager (TSM) architecture, which may creat... Read More about Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture..

Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. (2012)
Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012). Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. In A. Mana, & M. Klonowski (Eds.), 5th International Conference on New Technologies, Mobility and Security (NTMS) (1-7). https://doi.org/10.1109/NTMS.2012.6208760

Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementations are kept proprietary by smart card manufacturers in order to remain c... Read More about Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis..

A privacy preserving application acquisition protocol. (2012)
Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012). A privacy preserving application acquisition protocol. In G. Min, & F. Marmol (Eds.), 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12) (383-392). https://doi.org/10.1109/TrustCom.2012.47

In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers.... Read More about A privacy preserving application acquisition protocol..

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. (2012)
Conference Proceeding
Akram, R. N., Markantonakis, K., & Mayes, K. (2012). Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. In S. Xie (Ed.), 8th International Conference on Computational Intelligence and Security (CIS 2012) (646-652). https://doi.org/10.1109/CIS.2012.149

In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport et... Read More about Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem..