Prof. Gerhard Petrus HANCKE

Research Output

  1. 2011
  2. Actor coordination using info-gap decision theory in wireless sensor and actor networks

    Chinnappen-Rimer, S. & Hancke, G. P., 2011, In: International Journal of Sensor Networks. 10, 4, p. 177-191

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 33
    Check@CityULib
  3. A generic NFC-enabled measurement system for remote monitoring and control of client-side equipment

    Opperman, C. A. & Hancke, G. P., 2011, Proceedings - 3rd International Workshop on Near Field Communication, NFC 2011. p. 44-49 17

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 38
    Check@CityULib
  4. ns-2 extension to simulate localization system in wireless sensor networks

    Abu-Mahfouz, A. M. & Hancke, G. P., 2011, IEEE AFRICON Conference. 6072109

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 45
    Check@CityULib
  5. Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G. P., 2011, In: Journal of Computer Security. 19, 2, p. 259-288

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 49
    Check@CityULib
  6. Using NFC-enabled phones for remote data acquisition and digital control

    Opperman, C. A. & Hancke, G. P., 2011, IEEE AFRICON Conference. 6072147

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 43
    Check@CityULib
  7. 2010
  8. Wireless sensor networks for smart grid: Research challenges and potential applications

    Sahin, D., Gungor, V. C. & Hancke, G. P., 1 Jan 2010, Smart Grid Communications and Networking. Cambridge University Press, p. 265-278

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

    Scopus citations: 3
    Check@CityULib
  9. A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference. 1890796

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 6
    Check@CityULib
  10. A security framework model with communication protocol translator interface for enhancing NFC transactions

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, 6th Advanced International Conference on Telecommunications, AICT 2010. p. 452-461 5489770

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 6
    Check@CityULib
  11. NFC mobile transactions and authentication based on GSM network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings - 2nd International Workshop on Near Field Communication, NFC 2010. p. 83-89 5476457

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 52
    Check@CityULib
  12. On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, In: International Journal of Internet Technology and Secured Transactions. 2, 3-4, p. 336-356

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 18
    Check@CityULib
  13. Practical NFC peer-to-peer relay attack using mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6370 LNCS. p. 35-49 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6370 LNCS).

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 153
    Check@CityULib
  14. Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G. P., Markantonakis, K. & Mayes, K. E., 2010, In: Journal of Internet Technology. 11, 3, p. 307-313

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 64
    Check@CityULib
  15. Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W. D., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J. H., 2010, Proceedings of the 2010 IEEE International Conference on Progress in Informatics and Computing, PIC 2010. Vol. 1. p. 441-448 5687587

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 34
    Check@CityULib
  16. 2009
  17. Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., Oct 2009, In: Computers and Security. 28, 7, p. 615-627

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 91
    Check@CityULib
  18. Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., May 2009, In: Information Security Technical Report. 14, 2, p. 46-56

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 40
    Check@CityULib
  19. Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., May 2009, In: Information Security Technical Report. 14, 2, p. 87-95

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 14
    Check@CityULib
  20. Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2009, International Conference for Internet Technology and Secured Transactions, ICITST 2009. 5402513

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 32
    Check@CityULib
  21. 2008
  22. Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security. p. 194-202

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

    Scopus citations: 71
    Check@CityULib
  23. RFID and contactless technology

    Hancke, G. P., 2008, Smart Cards, Tokens, Security and Applications. Springer US, p. 295-322

    Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

    Scopus citations: 8
    Check@CityULib
  24. 2007
  25. Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

    Hancke, G., Nov 2007, In: Elektrotechnik und Informationstechnik. 124, 11, p. 404-408

    Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

    Scopus citations: 7
    Check@CityULib