Levent Ertaul
According to our database1,
Levent Ertaul
authored at least 24 papers
between 1994 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019
2010
Security Evaluation of CDMA2000.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
Security Challenges in Cloud Computing.
Proceedings of the 2010 International Conference on Security & Management, 2010
Security Issues for Mobile Government.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations.
Proceedings of the 2009 International Conference on Wireless Networks, 2009
Security in Wireless Sensor Networks - A Study.
Proceedings of the 2009 International Conference on Wireless Networks, 2009
Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs).
Proceedings of the 2009 International Conference on Security & Management, 2009
Today & Tomorrow: IEEE 802.11 WLAN Security.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN).
Proceedings of the 2008 International Conference on Security & Management, 2008
Implementations of Montgomery Multiplication Algorithms in Machine Languages.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs).
Proceedings of the 2007 International Conference on Wireless Networks, 2007
On the Generation of X.509v3 Certificates with Biometric Information.
Proceedings of the 2007 International Conference on Security & Management, 2007
RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs.
Proceedings of the 2007 International Conference on Security & Management, 2007
A PDA Implementation of an Off-line e-Cash Protocol.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
GSM Security II.
Proceedings of the 2006 International Conference on Wireless Networks, 2006
Mobile Agent Security.
Proceedings of the 2006 International Conference on Security & Management, 2006
Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
Novel Obfuscation Algorithms for Software Security.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005
ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I).
Proceedings of the NETWORKING 2005: Networking Technologies, 2005
GSM Security.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
2004
JHide - A tool kit for code obfuscation.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004
1994
A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols.
PhD thesis, 1994