Lishoy Francis



Patents

[2] "A method for achieving a user validation of a cryptographic key," Lishoy Francis et.al., Europe, 2014.

[1] "NFC range extension," Lishoy Francis et.al., Europe, 2013.

Conference, Journal, and Workshop Papers

[15] "A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones," Lishoy Francis, Gerhard Hancke, and Keith Mayes. In International Journal of RFID Security and Cryptography (IJRFIDSC), eds J. Zemerly, C. Y. Yeun, Volume 2, Issues 1-4, pp 92-106, Infonomics Society, ISSN 2046-3715, Mar-Dec 2013., download.

[14] "Enhancing the Security of Mobile Applications by using TEE and (U)SIM," Lishoy Francis et.al. UIAS 2013 in conjunction with The 10th IEEE International Conference on Autonomic and Trusted Computing (ATC 2013), December 18-20, 2013, Vietri sul Mare, Italy. (IEEE), download.

[13] "Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia), November 8 - 9, 2012, Taipei, Taiwan. 2012, download.

[12] "Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. In Cryptology ePrint Archive, Report 2011/618. November, 2011. paper, download.

[11] "A Practical Example of Mobile Phone Application using SATSA (JSR 177) API," Lishoy Francis. Book Chapter in Secure Smart Embedded Devices: Platforms and Applications. K. Markantonakis and K. Mayes (Eds). Springer. 2012.

[10] "A Location Based Security Framework for Authenticating Mobile Phones," Lishoy Francis, Keith Mayes, Gerhard Hancke, and Konstantinos Markantonakis. In Proc. The 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing in conjunction with ACM/IFIP/USENIX 11th International Middleware Conference (Middleware 2010). Nov 29 - Dec 03, 2010, Bangalore, India. (ACM). paper, download.

[09] "On the Security Issues of NFC enabled Mobile Phones," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. In International Journal of Internet Technology and Secured Transactions (IJITST 2010). (Inderscience). paper, download.

[08] "Practical NFC Peer-to-Peer Relay Attack using Mobile Phones," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. In Proc. The 6th Workshop on RFID Security (RFIDSec 2010). June 07-09, 2010, Istanbul, Turkey.(LNCS). paper, download, eprint download.

[07] "A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. In Proc. The Sixth Advanced International Conference on Telecommunications (AICT 2010). May 09-15, 2010, Barcelona, Spain. (IEEE). paper, download.

[06] "NFC Security Threats," Keith E. Mayes, Konstantinos Markantonakis, Lishoy Francis, and Gerhard Hancke. Near Field Communications, Smart Card Technology International. Editor Tim Courtney, pp 42-47, January 2010, ISSN 1361-8288, www.globalsmart.com.

[05] "Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms," Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. In Proc. RISC 2009, in conjunction with Internet Technology and Secured Transactions, 2009. ICITST 2009, London, UK. International Conference for, vol., no., pp.1-8, 9-12 Nov, 2009. (IEEE). paper, download.

[04] "An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems," Lishoy Francis, Keith Mayes, and Konstantinos Markantonakis. In Proc. Third International Conference on Convergence and Hybrid Information Technology (ICCIT08), iccit, vol. 2, pp.386-395, Busan, South Korea, November 11-13, 2008. (IEEE). paper, download.

[03] "On the Future of Accessing Multiple Telecommunication and Network Access Systems from a Single Smart Card," Lishoy Francis, Keith Mayes, and Konstantinos Markantonakis. Chapter for Information Security 2007, Ed. J McKenna, Touch Briefings.

[02] "On the Security Properties of Subscriber Identity Applications employed in Mobile Telecommunication Access Network Systems," Lishoy Francis, Keith Mayes, and Konstantinos Markantonakis.

[01] "Countermeasures for Attacks on Satellite TV Cards using Open Receivers," Lishoy Francis, William Sirett, Keith Mayes, and Konstantinos Markantonakis. In Proc. Third Australasian Information Security Workshop (AISW2005), Newcastle, Australia. CRPIT, 44. Safavi-Naini, R.,  Montague, P. and Sheppard, N., Eds., ACS. 153-158, 2005. paper, download