2008 |
8 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Robust Threshold Schemes Based on the Chinese Remainder Theorem.
AFRICACRYPT 2008: 94-108 |
7 | EE | Kamer Kaya,
Ali Aydin Selçuk:
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem.
INDOCRYPT 2008: 414-425 |
2007 |
6 | EE | Kamer Kaya,
Ali Aydin Selçuk:
Threshold cryptography based on Asmuth-Bloom secret sharing.
Inf. Sci. 177(19): 4148-4160 (2007) |
5 | EE | Kamer Kaya,
Bora Uçar,
Cevdet Aykanat:
Heuristics for scheduling file-sharing tasks on heterogeneous systems with distributed repositories.
J. Parallel Distrib. Comput. 67(3): 271-285 (2007) |
2006 |
4 | EE | Kamer Kaya,
Ali Aydin Selçuk,
Zahir Tezcan:
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing.
ISCIS 2006: 935-942 |
3 | EE | Hüseyin Acan,
Kamer Kaya,
Ali Aydin Selçuk:
Capture Resilient ElGamal Signature Protocols.
ISCIS 2006: 943-951 |
2 | EE | Kamer Kaya,
Cevdet Aykanat:
Iterative-Improvement-Based Heuristics for Adaptive Scheduling of Tasks Sharing Files on Heterogeneous Master-Slave Environments.
IEEE Trans. Parallel Distrib. Syst. 17(8): 883-896 (2006) |
1 | EE | Bora Uçar,
Cevdet Aykanat,
Kamer Kaya,
Murat Ikinci:
Task assignment in heterogeneous computing systems.
J. Parallel Distrib. Comput. 66(1): 32-46 (2006) |