The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Albert Levi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Albert Levi, Çetin Kaya Koç
    CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:286-295 [Conf]
  2. Albert Levi, Mahmut Özcan
    Practical and Secure E-Mail System (PractiSES). [Citation Graph (0, 0)][DBLP]
    ADVIS, 2004, pp:410-419 [Conf]
  3. Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi
    Privacy Preserving Clustering on Horizontally Partitioned Data. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:95- [Conf]
  4. Albert Levi, Erkay Savas
    Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1245-1250 [Conf]
  5. Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan
    Relay Attacks on Bluetooth Authentication and Solutions. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2004, pp:278-288 [Conf]
  6. Cagil Can Oniz, Erkay Savas, Albert Levi
    A Fair Multimedia Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2005, pp:342-351 [Conf]
  7. Albert Levi, Çetin Kaya Koç
    Reducing Certificate Revocating Cost using NPKI. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:51-60 [Conf]
  8. Albert Levi, M. Ufuk Çaglayan
    An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:203-214 [Conf]
  9. Albert Levi
    How secure is secure Web browsing? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2003, v:46, n:7, pp:152- [Journal]
  10. Albert Levi, Çetin Kaya Koç
    Risks in email security. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2001, v:44, n:8, pp:112- [Journal]
  11. Albert Levi, M. Ufuk Çaglayan
    Analytical Performance Evaluation of Nested Certificates. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 1999, v:36, n:1-4, pp:213-232 [Journal]
  12. Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç
    Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:21-59 [Journal]
  13. Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak
    Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:8, pp:1074-1086 [Journal]

  14. A game theoretic model for digital identity and trust in online communities. [Citation Graph (, )][DBLP]


  15. Distributed privacy preserving k-means clustering with additive secret sharing. [Citation Graph (, )][DBLP]


  16. Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  17. A resilient key predistribution scheme for multiphase wireless sensor networks. [Citation Graph (, )][DBLP]


  18. Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. [Citation Graph (, )][DBLP]


  19. Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario. [Citation Graph (, )][DBLP]


  20. Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  21. Disclosure Risks of Distance Preserving Data Transformations. [Citation Graph (, )][DBLP]


  22. An optimistic fair e-commerce protocol for large e-goods. [Citation Graph (, )][DBLP]


  23. Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  24. Towards a framework for security analysis of multiple password schemes. [Citation Graph (, )][DBLP]


  25. Public key cryptography based privacy preserving multi-context RFID infrastructure. [Citation Graph (, )][DBLP]


  26. Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. [Citation Graph (, )][DBLP]


  27. Privacy preserving clustering on horizontally partitioned data. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002