The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Levent Ertaul: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Levent Ertaul, Jayalalitha Panda
    Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:172-178 [Conf]
  2. Levent Ertaul, Vaidehi Kedlaya
    Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:152-158 [Conf]
  3. Basar Kasim, Levent Ertaul
    GSM Security. [Citation Graph (0, 0)][DBLP]
    ICWN, 2005, pp:555-561 [Conf]
  4. Levent Ertaul, Basar Kasim
    GSM Security II. [Citation Graph (0, 0)][DBLP]
    ICWN, 2006, pp:102-108 [Conf]
  5. Levent Ertaul, Weimin Lu
    ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2005, pp:102-113 [Conf]
  6. Suma Venkatesh, Levent Ertaul
    Novel Obfuscation Algorithms for Software Security. [Citation Graph (0, 0)][DBLP]
    Software Engineering Research and Practice, 2005, pp:209-215 [Conf]
  7. Levent Ertaul, Suma Venkatesh
    JHide - A tool kit for code obfuscation. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:133-138 [Conf]

  8. On the Generation of X.509v3 Certificates with Biometric Information. [Citation Graph (, )][DBLP]


  9. A PDA Implementation of an Off-line e-Cash Protocol. [Citation Graph (, )][DBLP]


  10. RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. [Citation Graph (, )][DBLP]


  11. Implementations of Montgomery Multiplication Algorithms in Machine Languages. [Citation Graph (, )][DBLP]


  12. Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN). [Citation Graph (, )][DBLP]


  13. Today & Tomorrow: IEEE 802.11 WLAN Security. [Citation Graph (, )][DBLP]


  14. Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). [Citation Graph (, )][DBLP]


  15. Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs). [Citation Graph (, )][DBLP]


  16. Security in Wireless Sensor Networks - A Study. [Citation Graph (, )][DBLP]


  17. The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002