Albert Levi
Orcid: 0000-0002-9714-3897
According to our database1,
Albert Levi
authored at least 98 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All...".
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Ad Hoc Networks, April, 2023
2022
ACM Comput. Surv., January, 2022
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity.
IEEE Trans. Dependable Secur. Comput., 2022
2021
Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms.
IEEE Access, 2021
Proceedings of the 11th IFIP International Conference on New Technologies, 2021
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
2020
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Int. Arab J. Inf. Technol., 2019
Comput. Networks, 2019
Comput. J., 2019
Ad Hoc Networks, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
IEEE Commun. Surv. Tutorials, 2018
Comput. Networks, 2018
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
2017
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
IACR Cryptol. ePrint Arch., 2017
Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context.
Ad Hoc Networks, 2017
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.
Ad Hoc Networks, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017
Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017
2016
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016
2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
Wirel. Commun. Mob. Comput., 2015
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015
Proceedings of the Information Sciences and Systems 2015, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks.
Peer-to-Peer Netw. Appl., 2014
Comput. J., 2014
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
Ad Hoc Networks, 2014
2013
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
Proceedings of the Information Sciences and Systems 2013, 2013
HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013
2012
Proceedings of the 20th International Conference on Software, 2012
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication.
Proceedings of the Computer and Information Sciences III, 2012
2011
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data.
Int. J. Data Warehous. Min., 2011
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach.
Comput. J., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the Computer and Information Sciences II, 2011
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
Proceedings of the Distributed Computing in Sensor Systems, 2011
Proceedings of the 3rd International Conference on Cyber Conflict, 2011
2010
Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures.
Sensors, 2010
Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments.
Mob. Networks Appl., 2010
Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools.
J. Intell. Manuf., 2010
Proceedings of the IEEE 21st International Symposium on Personal, 2010
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography.
Proceedings of the Q2SWinet'10, 2010
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach.
Comput. Secur., 2009
Ad Hoc Networks, 2009
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009
Proceedings of IEEE International Conference on Communications, 2009
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
Proceedings of the Scientific and Statistical Database Management, 2008
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.
Proceedings of the SECRYPT 2008, 2008
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.
Proceedings of the e-Business and Telecommunications - International Conference, 2008
Proceedings of the First European Workshop on System Security, 2008
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008
Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Visions of Computer Science, 2008
2007
Data Knowl. Eng., 2007
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
2006
IEEE Trans. Mob. Comput., 2006
Proceedings of the International Symposium on Computer Networks, 2006
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
2005
Proceedings of the Computer and Information Sciences, 2005
SeFER: secure, flexible and efficient routing protocol for distributed sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol.
Proceedings of the New Trends in Computer Networks, 2005
2004
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure.
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the Computer and Information Sciences, 2004
Sensor wars: detecting and defending against spam attacks in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the Advances in Information Systems, Third International Conference, 2004
2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
2001
Reducing Certificate Revocating Cost using NPKI.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
1999
Design and performanceevalution of the nested certification scheme and its application in public key infrastructures (İçiçe sertifikasyon düzeninin ve açık anahtar altyapılarındaki uygulamalarının tasarımı ve başarım değerlendirilmesi)
PhD thesis, 1999
Analytical Performance Evaluation of Nested Certificates.
Perform. Evaluation, 1999
A gigabyte-per-second parallel fiber optic network interface for multimedia applications.
IEEE Netw., 1999
Verification of classical certificates via nested certificates and nested certificate paths.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999