2006 |
12 | EE | Chandana Gamage,
Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network.
ISCC 2006: 41-47 |
2005 |
11 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials.
ACISP 2005: 548-559 |
10 | EE | Yusuf Uzunay,
Kemal Bicakci:
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access.
ICPADS (2) 2005: 245-249 |
9 | EE | Kemal Bicakci,
Bruno Crispo,
Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification.
SAC 2005: 1594-1598 |
8 | EE | Kemal Bicakci,
Nazife Baykal:
Improved server assisted signatures.
Computer Networks 47(3): 351-366 (2005) |
2004 |
7 | EE | Kemal Bicakci,
Nazife Baykal:
Server Assisted Signatures Revisited.
CT-RSA 2004: 143-156 |
6 | EE | Kemal Bicakci,
Nazife Baykal:
A New Design of Privilege Management Infrastructure with Binding Signature Semantics.
EuroPKI 2004: 306-313 |
2003 |
5 | EE | Kemal Bicakci,
Nazife Baykal:
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol.
ISCC 2003: 1239-1244 |
4 | EE | Kemal Bicakci,
Nazife Baykal:
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication.
ISCIS 2003: 794-801 |
3 | EE | Kemal Bicakci,
Nazife Baykal:
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.
SPC 2003: 187-200 |
2 | EE | Kemal Bicakci,
Gene Tsudik,
Brian Tung:
How to construct optimal one-time signatures.
Computer Networks 43(3): 339-349 (2003) |
2002 |
1 | EE | Kemal Bicakci,
Nazife Baykal:
Infinite Length Hash Chains and Their Applications.
WETICE 2002: 57-61 |