scispace - formally typeset
K

Keith Mayes

Researcher at Royal Holloway, University of London

Publications -  162
Citations -  2774

Keith Mayes is an academic researcher from Royal Holloway, University of London. The author has contributed to research in topics: Smart card & Smart card application protocol data unit. The author has an hindex of 24, co-authored 162 publications receiving 2574 citations. Previous affiliations of Keith Mayes include Vodafone & University of London.

Papers
More filters
Book ChapterDOI

Practical NFC peer-to-peer relay attack using mobile phones

TL;DR: In this paper, the authors describe how a relay attack can be implemented against systems using legitimate peer-to-peer NFC communication by developing and installing suitable MIDlets on the attacker's own NFC-enabled mobile phones, and discuss how relay attack countermeasures using device location could be used in the mobile environment.
BookDOI

Smart Cards, Tokens, Security and Applications

TL;DR: This state-of-the art work combines a cross-discipline overview of smart cards, tokens and related security and applications plus a technical reference to support further research and study.
Posted Content

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.

TL;DR: This work presents a practical implementation of an NFC-enabled relay attack, requiring only suitable mobile software applications, that reduces the complexity of relay attacks and therefore has potential security implications for current contactless systems.
Journal ArticleDOI

Confidence in smart token proximity: Relay attacks revisited

TL;DR: The effectiveness of time-out constraints, distance bounding and the use of a additional verification techniques for making systems relay-resistant are evaluated and the challenges still facing these mechanisms are explained.

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

TL;DR: In this article, the authors present a practical implementation of an NFC-enabled relay attack, requiring only suitable mobile software applications, which reduces the complexity of relay attacks and therefore has potential security implications for current contactless systems.