title
  

Creator/Author/Editor: Bingöl, Muhammed Ali

Warning The system is temporarily closed to updates for reporting purpose.

2020

Biçer, Osman and Bingöl, Muhammed Ali and Kiraz, Mehmet Sabır and Levi, Albert (2020) Highly efficient and re-executable private function evaluation with linear complexity. IEEE Transactions on Dependable and Secure Computing . ISSN 1545-5971 (Print) 1941-0018 (Online) Published Online First http://dx.doi.org/10.1109/TDSC.2020.3009496

2019

Bingöl, Muhammed Ali and Biçer, Osman and Kiraz, Mehmet Sabir and Levi, Albert (2019) An efficient 2-party private function evaluation protocol based on half gates. Computer Journal, 62 (4). pp. 598-613. ISSN 0010-4620 (Print) 1460-2067 (Online)

Bingöl, Muhammed Ali (2019) Efficient and secure schemes for private function evaluation. [Thesis]

Avoine, Gildas and Bingöl, Muhammed Ali and Boureanu, Ioana and Capkun, Srdjan and Hancke, Gerhard and Kardaş, Süleyman and Kim, Chong Hee and Lauradoux, Cédric and Martin, Benjamin and Munilla, Jorge and Peinado, Alberto and Rasmussen, Kasper Bonne and Singelée, Dave and Tchamkerten, Aslan and Trujillo-Rasua, Rolando and Vaudenay, Serge (2019) Security of distance-bounding: a survey. ACM Computing Surveys, 51 (5). ISSN 0360-0300 (Print) 1557-7341 (Online)

2017

Karaoğlan Altop, Duygu and Bingöl, Muhammed Ali and Levi, Albert and Savaş, Erkay (2017) DKEM: secure and efficient distributed key establishment protocol for wireless mesh networks. Ad Hoc Networks, 54 . pp. 53-68. ISSN 1570-8705 (Print) 1570-8713 (Online)

2016

Kardaş, Süleyman and Kiraz, Mehmet Sabir and Bingöl, Muhammed Ali and Birinci, Fatih (2016) Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude. Security and Communication Networks, 9 (18). pp. 5051-5063. ISSN 1939-0114 (Print) 1939-0122 (Online)

2015

Kardaş, Süleyman and Çelik, Serkan and Bingöl, Muhammed Ali and Kiraz, Mehmet Sabır and Demirci, Hüseyin and Levi, Albert (2015) k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wireless Communications and Mobile Computing, 15 (18). pp. 2150-2166. ISSN 1530-8669 (Print) 1530-8677 (Online)

2013

Kardaş, Süleyman and Çelik, Serkan and Bingöl, Muhammed Ali and Levi, Albert (2013) A new security and privacy framework for RFID in cloud computing. In: 5th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2013), Bristol, UK

Avoine, Gildas and Bingöl, Muhammed Ali and Carpent, Xavier and Kardaş, Süleyman (2013) Deploying OSK on low-resource mobile devices. In: 9th International Workshop on Radio Frequency Identification Security and Privacy Issues, Graz, Austria

2010

Avoine, Gildas and Bingöl, Muhammed Ali and Kardaş, Süleyman and Lauradoux, Cedric and Martin, Benjamin (2010) A framework for analyzing RFID distance bounding protocols. (Accepted/In Press)

Orhun, Kara and Kardaş, Süleyman and Bingöl, Muhammed Ali and Avoine, Gildas (2010) Optimal security limits of RFID distance bounding protocols. In: 6th Workshop on RFID Security (RFIDSec10), Istanbul, Turkey

This list was generated on Sat Nov 27 09:49:30 2021 +03.