|
Search the dblp DataBase
Albert Levi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Albert Levi, Çetin Kaya Koç
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP] ACSAC, 2001, pp:286-295 [Conf]
- Albert Levi, Mahmut Özcan
Practical and Secure E-Mail System (PractiSES). [Citation Graph (0, 0)][DBLP] ADVIS, 2004, pp:410-419 [Conf]
- Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi
Privacy Preserving Clustering on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2006, pp:95- [Conf]
- Albert Levi, Erkay Savas
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:1245-1250 [Conf]
- Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan
Relay Attacks on Bluetooth Authentication and Solutions. [Citation Graph (0, 0)][DBLP] ISCIS, 2004, pp:278-288 [Conf]
- Cagil Can Oniz, Erkay Savas, Albert Levi
A Fair Multimedia Exchange Protocol. [Citation Graph (0, 0)][DBLP] ISCIS, 2005, pp:342-351 [Conf]
- Albert Levi, Çetin Kaya Koç
Reducing Certificate Revocating Cost using NPKI. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:51-60 [Conf]
- Albert Levi, M. Ufuk Çaglayan
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:203-214 [Conf]
- Albert Levi
How secure is secure Web browsing? [Citation Graph (0, 0)][DBLP] Commun. ACM, 2003, v:46, n:7, pp:152- [Journal]
- Albert Levi, Çetin Kaya Koç
Risks in email security. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2001, v:44, n:8, pp:112- [Journal]
- Albert Levi, M. Ufuk Çaglayan
Analytical Performance Evaluation of Nested Certificates. [Citation Graph (0, 0)][DBLP] Perform. Eval., 1999, v:36, n:1-4, pp:213-232 [Journal]
- Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:21-59 [Journal]
- Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] IEEE Trans. Mob. Comput., 2006, v:5, n:8, pp:1074-1086 [Journal]
A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP]
Distributed privacy preserving k-means clustering with additive secret sharing. [Citation Graph (, )][DBLP]
Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A resilient key predistribution scheme for multiphase wireless sensor networks. [Citation Graph (, )][DBLP]
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. [Citation Graph (, )][DBLP]
Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario. [Citation Graph (, )][DBLP]
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Disclosure Risks of Distance Preserving Data Transformations. [Citation Graph (, )][DBLP]
An optimistic fair e-commerce protocol for large e-goods. [Citation Graph (, )][DBLP]
Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Towards a framework for security analysis of multiple password schemes. [Citation Graph (, )][DBLP]
Public key cryptography based privacy preserving multi-context RFID infrastructure. [Citation Graph (, )][DBLP]
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. [Citation Graph (, )][DBLP]
Privacy preserving clustering on horizontally partitioned data. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|