Attila A. Yavuz
Orcid: 0000-0002-8680-9307Affiliations:
- University of South Florida, Tampa, Department of Computer Science and Engineering
- Oregon State University, Corvallis, School of Electrical Engineering and Computer Science
- University of Pittsburgh, School of Information Sciences
According to our database1,
Attila A. Yavuz
authored at least 86 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on csee.usf.edu
On csauthors.net:
Bibliography
2024
Trustworthy and Efficient Digital Twins in Post-Quantum Era with Hybrid Hardware-Assisted Signatures.
ACM Trans. Multim. Comput. Commun. Appl., June, 2024
Signer-Optimal Multiple-Time Post-Quantum Hash-Based Signature for Heterogeneous IoT Systems.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom Filter.
CoRR, 2024
Counter Denial of Service for Next-Generation Networks within the Artificial Intelligence and Post-Quantum Era.
CoRR, 2024
Privacy-Preserving and Post-Quantum Counter Denial of Service Framework for Wireless Networks.
Proceedings of the IEEE Military Communications Conference, 2024
2023
CoRR, 2023
A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications.
CoRR, 2023
Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities.
CoRR, 2023
CoRR, 2023
A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities.
CoRR, 2023
Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
2022
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices.
IEEE Trans. Serv. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era.
Proceedings of the 4th IEEE International Conference on Trust, 2022
2021
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IEEE Trans. Serv. Comput., 2021
IEEE Access, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
ACM Trans. Priv. Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Location Privacy in Cognitive Radios With Multi-Server Private Information Retrieval.
IEEE Trans. Cogn. Commun. Netw., 2019
Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.
Proc. Priv. Enhancing Technol., 2019
J. Comput. Secur., 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Unleashing the Power of Multi-Server PIR for Enabling Private Access to Spectrum Databases.
IEEE Commun. Mag., 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures.
IEEE Trans. Cogn. Commun. Netw., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017
S<sup>3</sup>ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Wirel. Commun. Mob. Comput., 2016
An efficient technique for protecting location privacy of cooperative spectrum sensing users.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
IEEE Trans. Smart Grid, 2015
Secur. Commun. Networks, 2015
Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
IACR Cryptol. ePrint Arch., 2015
HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages.
IEEE Trans. Inf. Forensics Secur., 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012
Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks.
Ad Hoc Networks, 2012
Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012
2009
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2006
Proceedings of the Computer and Information Sciences, 2006
HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes.
Proceedings of the Computer and Information Sciences, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006