06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

R. N. Akram, K. Markantonakis, and K. Mayes, Cross-Plat<strong>for</strong>m Application Sharing<br />

Mechanism, in 10th IEEE International Conference on Trust, <strong>Security</strong> and Privacy in<br />

Computing and Communications (IEEE TrustCom-11), H. Wang, S. R. Tate, and Y.<br />

Xiang, Eds. Changsha, China: IEEE Computer Science, November 2011.<br />

R. N. Akram, K. Markantonakis, and K. Mayes, "Pseudorandom Number Generation<br />

in Smart Cards: An Implementation, Per<strong>for</strong>mance and Randomness Analysis", in 5th<br />

International Conference on New Technologies, Mobility and <strong>Security</strong> (NTMS), Antonio<br />

Mana, and Marek Klonowski, eds., Istanbul, Turkey, IEEE Computer Science, May 2012.<br />

R. N. Akram, K. Markantonakis, and K. Mayes, A Privacy Preserving Application Acquisition<br />

Protocol, in 11th IEEE International Conference on Trust, <strong>Security</strong> and Privacy<br />

in Computing and Communications (IEEE TrustCom-12), Geyong Min, Felix Gomez<br />

Marmol, Eds. Liverpool, United Kingdom: IEEE Computer Science, June 2012.<br />

5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!