2007 |
9 | EE | Umut Topkara,
Mikhail J. Atallah,
Mercan Topkara:
Passwords decay, words endure: secure and re-usable multiple password mnemonics.
SAC 2007: 292-299 |
8 | EE | Umut Topkara,
Mercan Topkara,
Mikhail J. Atallah:
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication.
USENIX Annual Technical Conference 2007: 369-374 |
2006 |
7 | EE | Umut Topkara,
Mercan Topkara,
Mikhail J. Atallah:
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions.
MM&Sec 2006: 164-174 |
6 | EE | Yohan Kim,
Mehmet Koyutürk,
Umut Topkara,
Ananth Grama,
Shankar Subramaniam:
Inferring functional information from domain co-evolution.
Bioinformatics 22(1): 40-49 (2006) |
5 | EE | Mehmet Koyutürk,
Yohan Kim,
Umut Topkara,
Shankar Subramaniam,
Wojciech Szpankowski,
Ananth Grama:
Pairwise Alignment of Protein Interaction Networks.
Journal of Computational Biology 13(2): 182-199 (2006) |
2005 |
4 | EE | Sundararaman Jeyaraman,
Umut Topkara:
Have the cake and eat it too - Infusing usability into text-password based authentication systems.
ACSAC 2005: 473-482 |
2004 |
3 | EE | Mercan Topkara,
Umut Topkara,
Mikhail J. Atallah,
Cüneyt M. Taskiran,
Eugene T. Lin,
Edward J. Delp:
A hierarchical protocol for increasing the stealthiness of steganographic methods.
MM&Sec 2004: 16-24 |
2002 |
2 | EE | Zhirong Wang,
Umut Topkara,
Tanja Schultz,
Alex Waibel:
Towards Universal Speech Recognition.
ICMI 2002: 247-252 |
1 | EE | Mikhail J. Atallah,
Victor Raskin,
Christian Hempelmann,
Mercan Karahan,
Radu Sion,
Umut Topkara,
Katrina E. Triezenberg:
Natural Language Watermarking and Tamperproofing.
Information Hiding 2002: 196-212 |