Kemal Bicakci
Orcid: 0000-0002-2378-8027
According to our database1,
Kemal Bicakci
authored at least 79 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Evaluating the Usability of Qualified Electronic Signatures: Systematized Use Cases and Design Paradigms.
CoRR, 2024
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems.
Comput. Secur., 2024
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers?
IACR Commun. Cryptol., 2024
2023
Int. J. Inf. Sec., April, 2023
IACR Cryptol. ePrint Arch., 2023
2022
CoRR, 2022
Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications.
CoRR, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
IEEE Access, 2020
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020
2019
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography.
Proceedings of the First IEEE International Conference on Trust, 2019
2018
The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks.
IEEE Syst. J., 2018
How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification.
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
IEEE Trans. Hum. Mach. Syst., 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
2016
Int. J. Hum. Comput. Stud., 2016
TwinCloud: A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management.
CoRR, 2016
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies.
Ad Hoc Networks, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Comput. Stand. Interfaces, 2015
Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication Proxies using Trusted Computing.
CoRR, 2015
Comput. Electr. Eng., 2015
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015
2014
The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks.
IEEE Trans. Computers, 2014
Ad Hoc Networks, 2014
Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies.
Proceedings of the IEEE Topical Conference on Wireless Sensors and Sensor Networks, 2014
The impact of bandwidth constraints on the energy consumption of Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Proceedings of the Technology and Practice of Passwords, 2014
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014
2013
ACM Trans. Internet Techn., 2013
Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013
Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation.
Comput. Stand. Interfaces, 2013
Network lifetime maximization and localized routing tradeoff in wireless sensor networks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013
Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks.
Proceedings of the 21st Signal Processing and Communications Applications Conference, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
The impact of link unidirectionality and reverse path length on wireless sensor network lifetime.
Proceedings of IEEE International Conference on Communications, 2013
Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures.
Inf. Sci., 2012
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset.
Comput. Secur., 2012
Proceedings of the 5th International Conference on New Technologies, 2012
2011
IEEE Commun. Lett., 2011
IEEE Commun. Lett., 2011
Comput. Stand. Interfaces, 2011
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation.
Proceedings of the 2011 New Security Paradigms Workshop, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Johnny in internet café: user study and exploration of password autocomplete in web browsers.
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
2010
Telecommun. Syst., 2010
Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks.
IEEE Commun. Lett., 2010
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks.
Ad Hoc Networks, 2010
Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010
Proceedings of the 2010 eCrime Researchers Summit, 2010
2009
IEEE Commun. Lett., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
How to incorporate revocation status information into the trust metrics for public-key certification.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology.
Proceedings of the MEDINFO 2004, 2004
A New Design of Privilege Management Infrastructure with Binding Signature Semantics.
Proceedings of the Public Key Infrastructure, 2004
2003
On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach ; Tanıma protokolleri, sayısal imzalar ve bunların e-sağlık uygulamalarının verimi üzerine: yukarıdan aşağıya bir yaklaşım.
PhD thesis, 2003
Proceedings of the Security in Pervasive Computing, 2003
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication.
Proceedings of the Computer and Information Sciences, 2003
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Proceedings of the AMIA 2003, 2003
2002
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002