Prof. Gerhard Petrus HANCKE
Research Output
- 2011
Actor coordination using info-gap decision theory in wireless sensor and actor networks
Chinnappen-Rimer, S. & Hancke, G. P., 2011, In: International Journal of Sensor Networks. 10, 4, p. 177-191Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 33A generic NFC-enabled measurement system for remote monitoring and control of client-side equipment
Opperman, C. A. & Hancke, G. P., 2011, Proceedings - 3rd International Workshop on Near Field Communication, NFC 2011. p. 44-49 17Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 39ns-2 extension to simulate localization system in wireless sensor networks
Abu-Mahfouz, A. M. & Hancke, G. P., 2011, IEEE AFRICON Conference. 6072109Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 45Practical eavesdropping and skimming attacks on high-frequency RFID tokens
Hancke, G. P., 2011, In: Journal of Computer Security. 19, 2, p. 259-288Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 52Using NFC-enabled phones for remote data acquisition and digital control
Opperman, C. A. & Hancke, G. P., 2011, IEEE AFRICON Conference. 6072147Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 43- 2010
Wireless sensor networks for smart grid: Research challenges and potential applications
Sahin, D., Gungor, V. C. & Hancke, G. P., 1 Jan 2010, Smart Grid Communications and Networking. Cambridge University Press, p. 265-278Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 12 - Chapter in an edited book (Author) › peer-review
Scopus citations: 3A location based security framework for authenticating mobile phones
Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference. 1890796Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 6A security framework model with communication protocol translator interface for enhancing NFC transactions
Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, 6th Advanced International Conference on Telecommunications, AICT 2010. p. 452-461 5489770Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 6NFC mobile transactions and authentication based on GSM network
Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings - 2nd International Workshop on Near Field Communication, NFC 2010. p. 83-89 5476457Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 54On the security issues of NFC enabled mobile phones
Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, In: International Journal of Internet Technology and Secured Transactions. 2, 3-4, p. 336-356Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 18Practical NFC peer-to-peer relay attack using mobile phones
Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6370 LNCS. p. 35-49 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6370 LNCS).Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 160Security challenges for user-oriented RFID applications within the "Internet of things"
Hancke, G. P., Markantonakis, K. & Mayes, K. E., 2010, In: Journal of Internet Technology. 11, 3, p. 307-313Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 68Using 3G network components to enable NFC mobile transactions and authentication
Chen, W. D., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, PIC 2010. Vol. 1. p. 441-448 5687587Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 34- 2009
Confidence in smart token proximity: Relay attacks revisited
Hancke, G. P., Mayes, K. E. & Markantonakis, K., Oct 2009, In: Computers and Security. 28, 7, p. 615-627Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 94Attacking smart card systems: Theory and practice
Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., May 2009, In: Information Security Technical Report. 14, 2, p. 46-56Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 40Transport ticketing security and fraud controls
Mayes, K. E., Markantonakis, K. & Hancke, G., May 2009, In: Information Security Technical Report. 14, 2, p. 87-95Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 15Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms
Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. 5402513Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 33- 2008
Attacks on time-of-flight distance bounding channels
Hancke, G. P. & Kuhn, M. G., 2008, WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security. p. 194-202Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 32 - Refereed conference paper (with host publication) › peer-review
Scopus citations: 72RFID and contactless technology
Hancke, G. P., 2008, Smart Cards, Tokens, Security and Applications. Springer US, p. 295-322Research output: Chapters, Conference Papers, Creative and Literary Works › RGC 12 - Chapter in an edited book (Author) › peer-review
Scopus citations: 8- 2007
Modulating a noisy carrier signal for eavesdropping-resistant HF RFID
Hancke, G., Nov 2007, In: Elektrotechnik und Informationstechnik. 124, 11, p. 404-408Research output: Journal Publications and Reviews › RGC 21 - Publication in refereed journal › peer-review
Scopus citations: 7