Creator/Author/Editor: Ustaoğlu, Berkant


Kim, Minkyu and Fujioka, Atsushi and Ustaoğlu, Berkant (2012) Strongly secure authenticated key exchange without NAXOS' approach under computational Diffie-Hellman assumption. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E95A (1). pp. 29-39. ISSN 0916-8508

Javid Khayati, Leyli and Savaş, Erkay and Ustaoğlu, Berkant and Örencik, Cengiz (2012) Privacy-preserving targeted advertising scheme for IPTV using the cloud. In: International Conference on Security and Cryptography (SECRYPT 2012), Rome, Italy

This list was generated on Tue Jul 29 22:18:04 2014 EEST.