Prof. Gerhard Petrus HANCKE

Research Output

  1. 2010
  2. A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference. 1890796

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 6
    Check@CityULib
  3. A security framework model with communication protocol translator interface for enhancing NFC transactions

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, 6th Advanced International Conference on Telecommunications, AICT 2010. p. 452-461 5489770

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 6
    Check@CityULib
  4. NFC mobile transactions and authentication based on GSM network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings - 2nd International Workshop on Near Field Communication, NFC 2010. p. 83-89 5476457

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 51
    Check@CityULib
  5. On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, In: International Journal of Internet Technology and Secured Transactions. 2, 3-4, p. 336-356

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 18
    Check@CityULib
  6. Practical NFC peer-to-peer relay attack using mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6370 LNCS. p. 35-49 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6370 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 152
    Check@CityULib
  7. Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G. P., Markantonakis, K. & Mayes, K. E., 2010, In: Journal of Internet Technology. 11, 3, p. 307-314

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 64
    Check@CityULib
  8. Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W. D., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, PIC 2010. Vol. 1. p. 441-448 5687587

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 34
    Check@CityULib
  9. 2009
  10. Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., Oct 2009, In: Computers and Security. 28, 7, p. 615-627

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 90
    Check@CityULib
  11. Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., May 2009, In: Information Security Technical Report. 14, 2, p. 46-56

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 40
    Check@CityULib
  12. Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., May 2009, In: Information Security Technical Report. 14, 2, p. 87-95

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 14
    Check@CityULib
  13. Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. 5402513

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 32
    Check@CityULib
  14. 2008
  15. Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security. p. 194-202

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 71
    Check@CityULib
  16. RFID and contactless technology

    Hancke, G. P., 2008, Smart Cards, Tokens, Security and Applications. Springer US, p. 295-322

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)12_Chapter in an edited book (Author)peer-review

    Scopus citations: 8
    Check@CityULib
  17. 2007
  18. Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

    Hancke, G., Nov 2007, In: Elektrotechnik und Informationstechnik. 124, 11, p. 404-408

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib
  19. 2006
  20. Practical attacks on proximity identification systems (short paper)

    Hancke, G. P., 2006, Proceedings - IEEE Symposium on Security and Privacy. Vol. 2006. p. 328-333 1624023

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 107
    Check@CityULib
  21. So near and yet so far: Distance-bounding attacks in wireless networks

    Clulow, J., Hancke, G. P., Kuhn, M. G. & Moore, T., 2006, Security and Privacy in Ad-Hoc and Sensor Networks: Third European Workshop, ESAS 2006, Revised Selected Papers. Springer Verlag, Vol. 4357 LNCS. p. 83-97 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4357 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 118
    Check@CityULib
  22. 2005
  23. An RFID distance bounding protocol

    Hancke, G. P. & Kuhn, M. G., 2005, Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005. Vol. 2005. p. 67-73 1607560

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 382
    Check@CityULib
  24. 2003
  25. The design and implementation of a general-purpose, secure, measurement and control network incorporating internet-based access

    Smit, J. E. S. & Hancke, G. P., 2003, Conference Record - IEEE Instrumentation and Measurement Technology Conference. Vol. 2. p. 1643-1647

    Research output: Chapters, Conference Papers, Creative and Literary Works (RGC: 12, 32, 41, 45)32_Refereed conference paper (with host publication)peer-review

    Scopus citations: 4
    Check@CityULib
Previous 1...8 9 10 11 12 Next