Scopus atıfları ve BeeHub'da kayıtlı yayın sayısına göre hesaplanmaktadır
1992 …2024

Yıla göre araştırma çıktıları

Filtre
Konferans katkısı

Arama sonuçları

  • 2024

    Friends, Not Foes: Enhancing Attack Surface Metrics of Web Applications with Large Language Models

    Tortumlu, A. & Bicakci, K., 2024, 17th International Conference on Information Security and Cryptology, ISCTurkiye 2024 - Proceedings. Selcuk, A. A., Sagiroglu, S., Yayla, O. & Tezcan, C. (eds.). Institute of Electrical and Electronics Engineers Inc., (17th International Conference on Information Security and Cryptology, ISCTurkiye 2024 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • KAIME: Central Bank Digital Currency with Realistic and Modular Privacy

    Dogan, A. & Bicakci, K., 2024, Proceedings of the 10th International Conference on Information Systems Security and Privacy. Lenzini, G., Mori, P. & Furnell, S. (eds.). Science and Technology Publications, Lda, p. 672-681 10 p. (International Conference on Information Systems Security and Privacy; hac. 1).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    1 Atıf (Scopus)
  • 2023

    QRAuth: A Secure and Accessible Web Authentication Alternative to FIDO2

    Bicakci, K. & Drobi, A., 2023, 16th International Conference on Information Security and Cryptology, ISCTURKEY 2023 - Proceedings. Selcuk, A. A., Yayla, O., Sagiroglu, S. & Tezcan, C. (eds.). Institute of Electrical and Electronics Engineers Inc., (16th International Conference on Information Security and Cryptology, ISCTURKEY 2023 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • 2022

    Is FIDO2 Passwordless Authentication a Hype or for Real? A Position Paper

    Bicakci, K. & Uzunay, Y., 2022, 15th International Conference on Information Security and Cryptography, ISCTURKEY 2022 - Proceedings. Ozbudak, F., Sagiroglu, S. & Selcuk, A. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 68-73 6 p. (15th International Conference on Information Security and Cryptography, ISCTURKEY 2022 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    9 Atıf (Scopus)
  • 2021

    Android Ö n yüklü Uygulamalarin Kullanici Mahremiyetine Etkileri

    Ozbay, A. & Bicakci, K., 2021, 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings. Sagiroglu, S., Akleylek, S., Alkan, M., Ozbudak, F., Canbay, Y., Karacuha, E. & Selcuk, A. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 12-17 6 p. (14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • Exploring and Improving the Usability of ModSecurity Web Application Firewall

    Alagoz, M., Tok, M. S. & Bicakci, K., 2021, 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings. Sagiroglu, S., Akleylek, S., Alkan, M., Ozbudak, F., Canbay, Y., Karacuha, E. & Selcuk, A. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 51-56 6 p. (14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working

    Bicakci, K., Uzunay, Y. & Khan, M., 2021, 14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings. Sagiroglu, S., Akleylek, S., Alkan, M., Ozbudak, F., Canbay, Y., Karacuha, E. & Selcuk, A. A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 28-33 6 p. (14th International Conference on Information Security and Cryptology, ISCTURKEY 2021 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    3 Atıf (Scopus)
  • 2020

    Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication

    Bicakci, K., Salman, O., Uzunay, Y. & Tan, M., 3 Ara 2020, 2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings. Sagiroglu, S., Akleylek, S., Ozbudak, F. & Canbay, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 11-17 7 p. 9307967. (2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    5 Atıf (Scopus)
  • Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things

    Burakgazi Bilgen, M. & Bicakci, K., 3 Ara 2020, 2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings. Sagiroglu, S., Akleylek, S., Ozbudak, F. & Canbay, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 48-55 8 p. 9307964. (2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    4 Atıf (Scopus)
  • Security Analysis of Mobile Authenticator Applications

    Ozkan, C. & Bicakci, K., 3 Ara 2020, 2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings. Sagiroglu, S., Akleylek, S., Ozbudak, F. & Canbay, Y. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 18-30 13 p. 9308020. (2020 International Conference on Information Security and Cryptology, ISCTURKEY 2020 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    11 Atıf (Scopus)
  • Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs

    Aydin, M., Butun, I., Bicakci, K. & Baykal, N., Oca 2020, 2020 10th Annual Computing and Communication Workshop and Conference, CCWC 2020. Chakrabarti, S. & Paul, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 774-779 6 p. 9031125. (2020 10th Annual Computing and Communication Workshop and Conference, CCWC 2020).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    14 Atıf (Scopus)
  • 2019

    Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptography

    Bicakci, K., Ak, I. K., Ozdemir, B. A. & Gozutok, M., Ara 2019, Proceedings - 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019. Institute of Electrical and Electronics Engineers Inc., p. 177-183 7 p. 9014373. (Proceedings - 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • 2018

    A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and Countermeasures

    Huseinovic, A., Mrdovic, S., Bicakci, K. & Uludag, S., 2018, 2018 26th Telecommunications Forum, TELFOR 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8611847. (2018 26th Telecommunications Forum, TELFOR 2018 - Proceedings).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    25 Atıf (Scopus)
  • Automated generation of attack graphs using NVD

    Aksu, M. U., Bicakci, K., Dilek, M. H., Ozbayoglu, A. M. & Tatlı, E. İ., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 135-142 8 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; hac. 2018-January).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    44 Atıf (Scopus)
  • How Safe Is Safety Number? A User Study on SIGNAL’s Fingerprint and Safety Number Methods for Public Key Verification

    Bicakci, K., Altuncu, E., Sahkulubey, M. S., Kiziloz, H. E. & Uzunay, Y., 2018, Information Security - 21st International Conference, ISC 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer Verlag, p. 85-98 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); hac. 11060 LNCS).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • 2017

    A quantitative CVSS-based cyber security risk assessment methodology for IT systems

    Aksu, M. U., Dilek, M. H., Tatli, E. I., Bicakci, K., Dirik, H. I., Demirezen, M. U. & Aykir, T., 5 Ara 2017, Proceedings - 2017 International Carnahan Conference on Security Technology, ICCST 2017. Ortega-Garcia, J., Morales, A., Fierrez, J., Vera-Rodriguez, R. & Lazzeretti, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. (Proceedings - International Carnahan Conference on Security Technology; hac. 2017-October).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    62 Atıf (Scopus)
  • TwinCloud: Secure cloud sharing without explicit key management

    Bicakci, K., Yavuz, D. D. & Gurkan, S., 21 Şub 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 581-585 5 p. 7860552. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    6 Atıf (Scopus)
  • 2016

    The impact of bandwidth constraints on the energy consumption of Wireless Sensor Networks

    Cotuk, H., Tavli, B., Bicakci, K. & Akgun, M. B., 3 Nis 2016, IEEE Wireless Communications and Networking Conference, WCNC. Institute of Electrical and Electronics Engineers Inc., p. 2787-2792 6 p. 6952870. (IEEE Wireless Communications and Networking Conference, WCNC).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    11 Atıf (Scopus)
  • Towards making accessible human-interaction proofs more secure and usable

    Kiziloz, H. E. & Bicakci, K., 11 Şub 2016, 20th IEEE Symposium on Computers and Communication, ISCC 2015. Institute of Electrical and Electronics Engineers Inc., p. 607-612 6 p. 7405581. (Proceedings - IEEE Symposium on Computers and Communications; hac. 2016-February).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    2 Atıf (Scopus)
  • 2015

    Trusted3Ballot: Improving security and usability of three ballot voting system using trusted computing

    Uzunay, Y. & Bicakci, K., 28 Eyl 2015, Proceedings - 5th International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2014. Al-Dabass, D., Sauli, Z. & Zakaria, Z. (eds.). IEEE Computer Society, p. 534-539 6 p. 7280967. (Proceedings - International Conference on Intelligent Systems, Modelling and Simulation, ISMS; hac. 2015-September).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    2 Atıf (Scopus)
  • 2014

    Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies

    Yildiz, H. U., Bicakci, K. & Tavli, B., 2014, WiSNet 2014 - Proceedings: 2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks. IEEE Computer Society, p. 49-51 3 p. 6825515. (WiSNet 2014 - Proceedings: 2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    2 Atıf (Scopus)
  • Mobile authentication secure against man-in-the-middle attacks

    Bicakci, K., Unal, D., Ascioglu, N. & Adalier, O., 2014, Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014. IEEE Computer Society, p. 273-276 4 p. 6834975. (Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    20 Atıf (Scopus)
  • 2013

    Kablosuz algilayici aǧlarda yaşam süresi eniyilemesi ve yerel yönlendirme ödünleşmesi

    Uzun, E., Aksac, A., Ozturk, O., Kiziloz, H. E., Incebacak, D., Tavli, B. & Bicakci, K., 2013, 2013 21st Signal Processing and Communications Applications Conference, SIU 2013. 6531201. (2013 21st Signal Processing and Communications Applications Conference, SIU 2013).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • Mobility helps energy balancing in wireless networks

    Pala, Z., Bicakci, K. & Tavli, B., 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 293-298 6 p. 6735638. (Proceedings - IEEE Military Communications Conference MILCOM).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    2 Atıf (Scopus)
  • Revisiting graphical passwords for augmenting, not replacing, text passwords

    Akpulat, M., Bicakci, K. & Cil, U., 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 119-128 10 p. (ACM International Conference Proceeding Series).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    3 Atıf (Scopus)
  • Tek yönlü baǧlanti tokalaşma atlama uzunluǧunun kablosuz algilayici aǧ yaşam süresine etkileri

    Batmaz, A. U., Tavli, B., Incebacak, D. & Biçakçi, K., 2013, 2013 21st Signal Processing and Communications Applications Conference, SIU 2013. 6531580. (2013 21st Signal Processing and Communications Applications Conference, SIU 2013).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • The impact of link unidirectionality and reverse path length on wireless sensor network lifetime

    Batmaz, A. U., Tavli, B., Incebacak, D. & Bicakci, K., 2013, 2013 IEEE International Conference on Communications, ICC 2013. Institute of Electrical and Electronics Engineers Inc., p. 1795-1799 5 p. 6654780. (IEEE International Conference on Communications).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    3 Atıf (Scopus)
  • 2012

    Energy cost of mitigating physical attacks in wireless sensor networks

    Incebacak, D., Bicakci, K. & Tavli, B., 2012, 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops. 6208712. (2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • Exploration and field study of a password manager using icon-based passwords

    Bicakci, K., Atalay, N. B., Yuceel, M. & Van Oorschot, P. C., 2012, Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Revised Selected Papers. p. 104-118 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); hac. 7126 LNCS).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    5 Atıf (Scopus)
  • 2011

    A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation

    Bicakci, K. & Van Oorschot, P. C., 2011, NSPW'11 - Proceedings of the 2011 New Security Paradigms Workshop. p. 25-36 12 p. (Proceedings New Security Paradigms Workshop).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    13 Atıf (Scopus)
  • Johnny in Internet café: User study and exploration of password autocomplete in web browsers

    Bicakci, K., Atalay, N. B. & Kiziloz, H. E., 2011, DIM'11 - Proceedings of the 7th ACM Workshop on Digital Identity Management. p. 33-42 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    5 Atıf (Scopus)
  • 2010

    Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks

    Incebacak, D., Bicakci, K. & Tavli, B., 2010, Proceedings - UKSim 4th European Modelling Symposium on Computer Modelling and Simulation, EMS2010. p. 414-419 6 p. 5703720. (Proceedings - UKSim 4th European Modelling Symposium on Computer Modelling and Simulation, EMS2010).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • Kablosuz algilayici aǧlarda baǧlanti sayisinin sinirlandirilmasinin aǧ ömrü üzerindeki etkilerinin i̇ncelenmesi

    Burak Akgün, M., Tavl, B. & Biçakci, K., 2010, 2010 National Conference on Electrical, Electronics and Computer Engineering, ELECO 2010. p. 671-675 5 p. 5698092. (2010 National Conference on Electrical, Electronics and Computer Engineering, ELECO 2010).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

  • NoTabNab: Protection against the "tabnabbing attack"

    Unlu, S. A. & Bicakci, K., 2010, General Members Meeting and eCrime Researchers Summit, eCrime 2010. 5706695. (General Members Meeting and eCrime Researchers Summit, eCrime 2010).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    6 Atıf (Scopus)
  • 2009

    Graphical passwords as browser extension: Implementation and usability study

    Bicakci, K., Yuceel, M., Erdeniz, B., Gurbaslar, H. & Atalay, N. B., 2009, Trust Management III - 3rd IFIP WG 11.11 International Conference, IFIPTM 2009, Proceedings. Ferrari, E., Li, N., Bertino, E. & Karabulut, Y. (eds.). Springer New York LLC, p. 15-29 15 p. (IFIP Advances in Information and Communication Technology; hac. 300).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    8 Atıf (Scopus)
  • Pushing the limits of one-time signatures

    Bicakci, K., 2009, SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks. p. 249-257 9 p. 1626258. (SIN'09 - Proceedings of the 2nd International Conference on Security of Information and Networks).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • Towards usable solutions to graphical password hotspot problem

    Bicakci, K., Atalay, N. B., Yuceel, M., Gurbaslar, H. & Erdeniz, B., 2009, Proceedings - 2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009. p. 318-323 6 p. 5254108. (Proceedings - International Computer Software and Applications Conference; hac. 2).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    26 Atıf (Scopus)
  • 2008

    Optimal discretization for high-entropy graphical passwords

    Bicakci, K., 2008, 2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008. 4717862. (2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    Açık erişim
    4 Atıf (Scopus)
  • 2007

    SHA: A secure voice activated smart home for quadriplegia patients

    Uzunay, Y. & Bicakci, K., 2007, Proceedings - 2007 IEEE International Conference on Bioinformatics and Biomedicine Workshops, BIBMW. p. 151-158 8 p. 4425413. (Proceedings - 2007 IEEE International Conference on Bioinformaticsand Biomedicine Workshops, BIBMW).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    6 Atıf (Scopus)
  • 2006

    Security for the mythical air-dropped sensor network

    Gamage, C., Bicakci, K., Crispo, B. & Tanenbaum, A. S., 2006, Proceedings - 11th IEEE Symposium on Computers and Communications, ISCC 2006. Institute of Electrical and Electronics Engineers Inc., p. 41-47 7 p. 1691005. (Proceedings - IEEE Symposium on Computers and Communications).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    12 Atıf (Scopus)
  • 2005

    A cost-efficient counter-intrusion scheme for one-time sensor networks

    Gamage, C., Leiwo, J., Bicakci, K., Crispo, B. & Tanenbaum, A. S., 2005, Proceedings of the 2005 Intelligent Sensors, Sensor Networks and Information Processing Conference. IEEE Computer Society, p. 45-50 6 p. 1595554. (Proceedings of the 2005 Intelligent Sensors, Sensor Networks and Information Processing Conference; hac. 2005).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • One-time sensors: A novel concept to mitigate node-capture attacks

    Bicakci, K., Gamage, C., Crispo, B. & Tanenbaum, A. S., 2005, Security and Privacy in Ad-hoc and Sensor Networks - Second European Workshop, ESAS 2005, Revised Selected Papers. p. 80-90 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); hac. 3813 LNCS).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    9 Atıf (Scopus)
  • UNIDES: An efficient real-time system to detect and block unauthorized Internet access

    Uzunay, Y. & Bicakci, K., 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 245-249 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; hac. 2).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • 2004

    EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology

    Bicakci, K. & Baykal, N., 2004, Studies in Health Technology and Informatics. Fieschi, M., Coiera, E. W. & Li, Y.-C. (eds.). IOS Press BV, p. 1241-1245 5 p. (Studies in Health Technology and Informatics; hac. 107).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    1 Atıf (Scopus)
  • 2003

    Design and performance evaluation of a flexible and efficient server assisted signature protocol

    Bicakci, K. & Baykal, N., 2003, Proceedings - 8th IEEE International Symposium on Computers and Communication, ISCC 2003. p. 1239-1244 6 p. 1214284. (Proceedings - IEEE Symposium on Computers and Communications).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    5 Atıf (Scopus)
  • 2002

    Infinite length hash chains and their applications

    Bicakci, K. & Baykal, N., 2002, Proceedings - 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002. IEEE Computer Society, p. 57-61 5 p. 1029989. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; hac. 2002-January).

    Araştırma sonucu: Kitap/Rapor/Konferans Bildirisinde BölümKonferans katkısıbilirkişi

    41 Atıf (Scopus)