Kemal Bicakci

Orcid: 0000-0002-2378-8027

According to our database1, Kemal Bicakci authored at least 79 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Evaluating the Usability of Qualified Electronic Signatures: Systematized Use Cases and Design Paradigms.
CoRR, 2024

ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems.
Comput. Secur., 2024

Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
IACR Commun. Cryptol., 2024

2023
Authentication-enabled attribute-based access control for smart homes.
Int. J. Inf. Sec., April, 2023

KAIME : Central Bank Digital Currency with Realistic and Modular Privacy.
IACR Cryptol. ePrint Arch., 2023

2022
Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper.
CoRR, 2022

Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications.
CoRR, 2022

2021
White-Box Implementations for Hash-Based Signatures and One-Time Passwords.
IACR Cryptol. ePrint Arch., 2021

2020
A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid.
IEEE Access, 2020

Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

2019
Analyzing Turkish F and Turkish E keyboard layouts using learning curves.
CoRR, 2019

Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography.
Proceedings of the First IEEE International Conference on Trust, 2019

2018
The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks.
IEEE Syst. J., 2018

How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.
Proceedings of the Information Security - 21st International Conference, 2018

Automated Generation of Attack Graphs Using NVD.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
A Closer Look at Pure-Text Human-Interaction Proofs.
IEEE Trans. Hum. Mach. Syst., 2017

A quantitative CVSS-based cyber security risk assessment methodology for IT systems.
Proceedings of the International Carnahan Conference on Security Technology, 2017

2016
Leveraging human computation for pure-text Human Interaction Proofs.
Int. J. Hum. Comput. Stud., 2016

TwinCloud: A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management.
CoRR, 2016

Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies.
Ad Hoc Networks, 2016

TwinCloud: Secure cloud sharing without explicit key management.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Evaluating energy cost of route diversity for security in wireless sensor networks.
Comput. Stand. Interfaces, 2015

Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication Proxies using Trusted Computing.
CoRR, 2015

Could We Distinguish Child Users from Adults Using Keystroke Dynamics?
CoRR, 2015

Effects of node mobility on energy balancing in wireless networks.
Comput. Electr. Eng., 2015

Towards making accessible human-interaction proofs more secure and usable.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

2014
The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks.
IEEE Trans. Computers, 2014

The impact of scalable routing on lifetime of smart grid communication networks.
Ad Hoc Networks, 2014

Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies.
Proceedings of the IEEE Topical Conference on Wireless Sensors and Sensor Networks, 2014

The impact of bandwidth constraints on the energy consumption of Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication.
Proceedings of the Technology and Practice of Passwords, 2014

Mobile Authentication Secure Against Man-In-The-Middle Attacks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload.
ACM Trans. Internet Techn., 2013

Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation.
Comput. Stand. Interfaces, 2013

Network lifetime maximization and localized routing tradeoff in wireless sensor networks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013

Mobility Helps Energy Balancing in Wireless Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

The impact of link unidirectionality and reverse path length on wireless sensor network lifetime.
Proceedings of IEEE International Conference on Communications, 2013

Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Revisiting graphical passwords for augmenting, not replacing, text passwords.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
A survey of visual sensor network platforms.
Multim. Tools Appl., 2012

Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures.
Inf. Sci., 2012

A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset.
Comput. Secur., 2012

Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

2011
Impact of Limiting Number of Links on the Lifetime of Wireless Sensor Networks.
IEEE Commun. Lett., 2011

Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability.
IEEE Commun. Lett., 2011

Maximizing lifetime of event-unobservable wireless sensor networks.
Comput. Stand. Interfaces, 2011

A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.
Proceedings of the 2011 New Security Paradigms Workshop, 2011

Exploration and Field Study of a Password Manager Using Icon-Based Passwords.
Proceedings of the Financial Cryptography and Data Security, 2011

Johnny in internet café: user study and exploration of password autocomplete in web browsers.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011

2010
The future of security in Wireless Multimedia Sensor Networks - A position paper.
Telecommun. Syst., 2010

Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks.
IEEE Commun. Lett., 2010

Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks.
Ad Hoc Networks, 2010

Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

NoTabNab: Protection against the "tabnabbing attack".
Proceedings of the 2010 eCrime Researchers Summit, 2010

2009
The impact of one-time energy costs on network lifetime in wireless sensor networks.
IEEE Commun. Lett., 2009

Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks.
Comput. Stand. Interfaces, 2009

Graphical passwords as browser extension: implementation and usability study.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Pushing the limits of one-time signatures.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Towards Usable Solutions to Graphical Password Hotspot Problem.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Optimal Discretization for High-Entropy Graphical Passwords.
IACR Cryptol. ePrint Arch., 2008

2007
One-time proxy signatures revisited.
Comput. Stand. Interfaces, 2007

2006
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes.
IACR Cryptol. ePrint Arch., 2006

Security for the Mythical Air-Dropped Sensor Network.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

2005
Improved server assisted signatures.
Comput. Networks, 2005

How to incorporate revocation status information into the trust metrics for public-key certification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Counting Abuses Using Flexible Off-line Credentials.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology.
Proceedings of the MEDINFO 2004, 2004

A New Design of Privilege Management Infrastructure with Binding Signature Semantics.
Proceedings of the Public Key Infrastructure, 2004

Server Assisted Signatures Revisited.
Proceedings of the Topics in Cryptology, 2004

2003
On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach ; Tanıma protokolleri, sayısal imzalar ve bunların e-sağlık uygulamalarının verimi üzerine: yukarıdan aşağıya bir yaklaşım.
PhD thesis, 2003

How to construct optimal one-time signatures.
Comput. Networks, 2003

SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing.
Proceedings of the Security in Pervasive Computing, 2003

One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication.
Proceedings of the Computer and Information Sciences, 2003

Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Survivable Authentication for Health Information Systems.
Proceedings of the AMIA 2003, 2003

2002
Infinite Length Hash Chains and Their Applications.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002


  Loading...