Follow
Carlton Shepherd
Carlton Shepherd
Lecturer (~Assistant Professor), Newcastle University, UK
Verified email at ncl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
15th IEEE International Conference on Trust, Security and Privacy in …, 2016
822016
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th International Conference on Availability, Reliability and Security, 7, 2017
302017
On the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data
I Gurulian, C Shepherd, E Frank, K Markantonakis, R Akram, K Mayes
16th IEEE International Conference on Trust, Security and Privacy in …, 2017
23*2017
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
C Shepherd, RN Akram, K Markantonakis
11th IFIP International Conference on Information Security Theory and …, 2017
222017
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions
C Shepherd, I Gurulian, E Frank, K Markantonakis, RN Akram, ...
IEEE Security & Privacy Workshops, 2017
21*2017
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance
C Shepherd, FAP Petitcolas, RN Akram, K Markantonakis
14th International Conference on Trust, Privacy & Security in Digital …, 2017
202017
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices
C Shepherd, K Markantonakis, GA Jaloyan
IEEE Security & Privacy Workshops, 2021
142021
Towards Trusted Execution of Multi-modal Continuous Authentication Schemes
C Shepherd, RN Akram, K Markantonakis
Proceedings of the 32nd Symposium on Applied Computing, 1444-1451, 2017
132017
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis
C Shepherd, K Markantonakis, N van Heijningen, D Aboulkassimi, ...
Computers & Security 111, 102471, 2021
122021
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy
F Hao, D Clarke, C Shepherd
Cambridge International Workshop on Security Protocols, 255-264, 2013
112013
Remote Credential Management with Mutual Attestation for Trusted Execution Environments
C Shepherd, RN Akram, K Markantonakis
12th IFIP Interntional Conference on Information Security Theory and …, 2018
8*2018
Privacy-enhancing context authentication from location-sensitive data
P Mainali, C Shepherd, FAP Petitcolas
Proceedings of the 14th International Conference on Availability …, 2019
52019
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay
G Haken, K Markantonakis, I Gurulian, C Shepherd, RN Akram
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 21-32, 2017
52017
A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Fingerprinting on Mobile Devices
C Shepherd, J Kalbantner, B Semal, K Markantonakis
arXiv preprint arXiv:2110.06363, 2022
42022
Proximity assurances based on natural and artificial ambient environments
I Gurulian, K Markantonakis, C Shepherd, E Frank, RN Akram
Innovative Security Solutions for Information Technology and Communications …, 2017
42017
Privacy-enhancing fall detection from remote sensor data using multi-party computation
P Mainali, C Shepherd
Proceedings of the 14th International Conference on Availability …, 2019
22019
Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd
Royal Holloway, University Of London, 2019
22019
Investigating Black-Box Function Recognition Using Hardware Performance Counters
C Shepherd, B Semal, K Markantonakis
IEEE Transactions on Computers, 2022
12022
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles
V Vagal, K Markantonakis, C Shepherd
2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 1-7, 2021
2021
PyCocks - An implementation of Cocks’ identity-based encryption (IBE) scheme
C Shepherd
https://pypi.org/project/pycocks/, 0
The system can't perform the operation now. Try again later.
Articles 1–20