Follow
Raja Naeem Akram
Raja Naeem Akram
Department of Computer Science, University of Aberdeen
Verified email at abdn.ac.uk - Homepage
Title
Cited by
Cited by
Year
E-voting with blockchain: An e-voting protocol with decentralisation and voter privacy
FS Hardwick, A Gioulis, RN Akram, K Markantonakis
2018 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2018
1912018
Secure and trusted execution: Past, present, and future-a critical review in the context of the internet of things and cyber-physical systems
C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ...
2016 IEEE Trustcom/BigDataSE/ISPA, 168-177, 2016
802016
Security, privacy and safety evaluation of dynamic and static fleets of drones
RN Akram, K Markantonakis, K Mayes, O Habachi, D Sauveron, ...
2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC), 1-12, 2017
742017
A paradigm shift in smart card ownership model
RN Akram, K Markantonakis, K Mayes
2010 International Conference on Computational Science and Its Applications …, 2010
492010
Log your car: The non-invasive vehicle forensics
H Mansor, K Markantonakis, RN Akram, K Mayes, I Gurulian
2016 IEEE Trustcom/BigDataSE/ISPA, 974-982, 2016
472016
A certificateless group authenticated key agreement protocol for secure communication in untrusted UAV networks
B Semal, K Markantonakis, RN Akram
2018 IEEE/AIAA 37th Digital Avionics Systems Conference (DASC), 1-8, 2018
452018
Fair and transparent blockchain based tendering framework-a step towards open governance
FS Hardwick, RN Akram, K Markantonakis
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
412018
Philanthropy on the Blockchain
D Jayasinghe, S Cobourne, K Markantonakis, RN Akram, K Mayes
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
362018
Pseudorandom number generation in smart cards: an implementation, performance and randomness analysis
RN Akram, K Markantonakis, K Mayes
2012 5th International Conference on New Technologies, Mobility and Security …, 2012
332012
Application management framework in user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
Information Security Applications: 10th International Workshop, WISA 2009 …, 2009
332009
Establishing mutually trusted channels for remote sensing devices with trusted execution environments
C Shepherd, RN Akram, K Markantonakis
Proceedings of the 12th International Conference on Availability …, 2017
302017
A dynamic and ubiquitous smart card security assurance and validation mechanism
RN Akram, K Markantonakis, K Mayes
Security and Privacy–Silver Linings in the Cloud: 25th IFIP TC-11 …, 2010
272010
Don't brick your car: firmware confidentiality and rollback for vehicles
H Mansor, K Markantonakis, RN Akram, K Mayes
2015 10th International Conference on Availability, Reliability and Security …, 2015
262015
Trusted platform module for smart cards
RN Akram, K Markantonakis, K Mayes
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
262014
Emlog: tamper-resistant system logging for constrained devices with tees
C Shepherd, RN Akram, K Markantonakis
Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018
222018
An efficient, secure and trusted channel protocol for avionics wireless networks
RN Akram, K Markantonakis, K Mayes, PF Bonnefoi, D Sauveron, ...
2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC), 1-10, 2016
212016
An exploratory analysis of the security risks of the Internet of Things in finance
C Shepherd, FAP Petitcolas, RN Akram, K Markantonakis
Trust, Privacy and Security in Digital Business: 14th International …, 2017
202017
Firewall mechanism in a user centric smart card ownership model
RN Akram, K Markantonakis, K Mayes
Smart Card Research and Advanced Application: 9th IFIP WG 8.8/11.2 …, 2010
202010
Secure autonomous uavs fleets by using new specific embedded secure elements
RN Akram, PF Bonnefoi, S Chaumette, K Markantonakis, D Sauveron
2016 IEEE Trustcom/BigDataSE/ISPA, 606-614, 2016
192016
User centric security model for tamper-resistant devices
RN Akram, K Markantonakis, K Mayes
2011 IEEE 8th International Conference on e-Business Engineering, 168-177, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20