|
Search the dblp DataBase
Kemal Bicakci:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
Counting Abuses Using Flexible Off-line Credentials. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:548-559 [Conf]
- Kemal Bicakci, Nazife Baykal
Server Assisted Signatures Revisited. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:143-156 [Conf]
- Kemal Bicakci, Nazife Baykal
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. [Citation Graph (0, 0)][DBLP] EuroPKI, 2004, pp:306-313 [Conf]
- Yusuf Uzunay, Kemal Bicakci
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:245-249 [Conf]
- Kemal Bicakci, Nazife Baykal
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1239-1244 [Conf]
- Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
Security for the Mythical Air-Dropped Sensor Network. [Citation Graph (0, 0)][DBLP] ISCC, 2006, pp:41-47 [Conf]
- Kemal Bicakci, Nazife Baykal
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication. [Citation Graph (0, 0)][DBLP] ISCIS, 2003, pp:794-801 [Conf]
- Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum
How to incorporate revocation status information into the trust metrics for public-key certification. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:1594-1598 [Conf]
- Kemal Bicakci, Nazife Baykal
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. [Citation Graph (0, 0)][DBLP] SPC, 2003, pp:187-200 [Conf]
- Kemal Bicakci, Nazife Baykal
Infinite Length Hash Chains and Their Applications. [Citation Graph (0, 0)][DBLP] WETICE, 2002, pp:57-61 [Conf]
- Kemal Bicakci, Nazife Baykal
Improved server assisted signatures. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:47, n:3, pp:351-366 [Journal]
- Kemal Bicakci, Gene Tsudik, Brian Tung
How to construct optimal one-time signatures. [Citation Graph (0, 0)][DBLP] Computer Networks, 2003, v:43, n:3, pp:339-349 [Journal]
Towards Usable Solutions to Graphical Password Hotspot Problem. [Citation Graph (, )][DBLP]
Graphical passwords as browser extension: implementation and usability study. [Citation Graph (, )][DBLP]
Pushing the limits of one-time signatures. [Citation Graph (, )][DBLP]
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|