Imran Erguler

Orcid: 0000-0003-2279-3665

According to our database1, Imran Erguler authored at least 19 papers between 2005 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Age group detection using smartphone motion sensors.
Proceedings of the 25th European Signal Processing Conference, 2017

2016
Subtle Flaws in the Secure RFID Tag Searching Protocol: SRTS.
Wirel. Pers. Commun., 2016

Achieving Flatness: Selecting the Honeywords from Existing User Passwords.
IEEE Trans. Dependable Secur. Comput., 2016

A key recovery attack on an error-correcting code-based lightweight security protocol.
Secur. Commun. Networks, 2016

Side channel analysis on android smartphones.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

2015
A potential weakness in RFID-based Internet-of-things systems.
Pervasive Mob. Comput., 2015

2014
Unbalanced states violates RFID privacy.
J. Intell. Manuf., 2014

A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol.
IACR Cryptol. ePrint Arch., 2014

Some Remarks on Honeyword Based Password-Cracking Detection.
IACR Cryptol. ePrint Arch., 2014

2012
Security analysis of an ultra-lightweight RFID authentication protocol - SLMAP.
Secur. Commun. Networks, 2012

Security flaws in a recent RFID delegation protocol.
Pers. Ubiquitous Comput., 2012

Practical attacks and improvements to an efficient radio frequency identification authentication protocol.
Concurr. Comput. Pract. Exp., 2012

2011
Scalability and Security Conflict for RFID Authentication Protocols.
Wirel. Pers. Commun., 2011

A Salient Missing Link in RFID Security Protocols.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Attacks on an Efficient RFID Authentication Protocol.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2008
A Password-Based Key Establishment Protocol with Symmetric Key Cryptography.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2006
A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream Ciphers.
Proceedings of the Computer and Information Sciences, 2006

2005
A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers.
Proceedings of the Computer and Information Sciences, 2005

A modified stream generator for the GSM encryption algorithms A5/1 and A5/2.
Proceedings of the 13th European Signal Processing Conference, 2005


  Loading...