|
Search the dblp DataBase
Umut Topkara:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Sundararaman Jeyaraman, Umut Topkara
Have the cake and eat it too - Infusing usability into text-password based authentication systems. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:473-482 [Conf]
- Zhirong Wang, Umut Topkara, Tanja Schultz, Alex Waibel
Towards Universal Speech Recognition. [Citation Graph (0, 0)][DBLP] ICMI, 2002, pp:247-252 [Conf]
- Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg
Natural Language Watermarking and Tamperproofing. [Citation Graph (0, 0)][DBLP] Information Hiding, 2002, pp:196-212 [Conf]
- Umut Topkara, Mikhail J. Atallah, Mercan Topkara
Passwords decay, words endure: secure and re-usable multiple password mnemonics. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:292-299 [Conf]
- Yohan Kim, Mehmet Koyutürk, Umut Topkara, Ananth Grama, Shankar Subramaniam
Inferring functional information from domain co-evolution. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2006, v:22, n:1, pp:40-49 [Journal]
- Umut Topkara, Mercan Topkara, Mikhail J. Atallah
The hiding virtues of ambiguity: quantifiably resilient watermarking of natural language text through synonym substitutions. [Citation Graph (0, 0)][DBLP] MM&Sec, 2006, pp:164-174 [Conf]
- Mercan Topkara, Umut Topkara, Mikhail J. Atallah, Cüneyt M. Taskiran, Eugene Lin, Edward J. Delp
A hierarchical protocol for increasing the stealthiness of steganographic methods. [Citation Graph (0, 0)][DBLP] MM&Sec, 2004, pp:16-24 [Conf]
CoCoST: A Computational Cost Efficient Classifier. [Citation Graph (, )][DBLP]
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|