Search the dblp DataBase
Levent Ertaul :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Levent Ertaul , Jayalalitha Panda Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:172-178 [Conf ] Levent Ertaul , Vaidehi Kedlaya Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:152-158 [Conf ] Basar Kasim , Levent Ertaul GSM Security. [Citation Graph (0, 0)][DBLP ] ICWN, 2005, pp:555-561 [Conf ] Levent Ertaul , Basar Kasim GSM Security II. [Citation Graph (0, 0)][DBLP ] ICWN, 2006, pp:102-108 [Conf ] Levent Ertaul , Weimin Lu ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I). [Citation Graph (0, 0)][DBLP ] NETWORKING, 2005, pp:102-113 [Conf ] Suma Venkatesh , Levent Ertaul Novel Obfuscation Algorithms for Software Security. [Citation Graph (0, 0)][DBLP ] Software Engineering Research and Practice, 2005, pp:209-215 [Conf ] Levent Ertaul , Suma Venkatesh JHide - A tool kit for code obfuscation. [Citation Graph (0, 0)][DBLP ] IASTED Conf. on Software Engineering and Applications, 2004, pp:133-138 [Conf ] On the Generation of X.509v3 Certificates with Biometric Information. [Citation Graph (, )][DBLP ] A PDA Implementation of an Off-line e-Cash Protocol. [Citation Graph (, )][DBLP ] RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs. [Citation Graph (, )][DBLP ] Implementations of Montgomery Multiplication Algorithms in Machine Languages. [Citation Graph (, )][DBLP ] Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN). [Citation Graph (, )][DBLP ] Today & Tomorrow: IEEE 802.11 WLAN Security. [Citation Graph (, )][DBLP ] Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). [Citation Graph (, )][DBLP ] Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs). [Citation Graph (, )][DBLP ] Security in Wireless Sensor Networks - A Study. [Citation Graph (, )][DBLP ] The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs