Mehmet Sabir Kiraz
Orcid: 0000-0002-7262-562X
According to our database1,
Mehmet Sabir Kiraz
authored at least 34 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption.
EURASIP J. Wirel. Commun. Netw., December, 2024
Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions.
ACM Comput. Surv., October, 2024
A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs.
Future Internet, September, 2024
2023
2022
Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures.
Veh. Commun., 2022
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity.
IEEE Trans. Dependable Secur. Comput., 2022
2021
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures.
Comput. J., 2021
2020
Policy specification and verification for blockchain and smart contracts in 5G networks.
ICT Express, 2020
2019
KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures.
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Comput. J., 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security Theory and Practice, 2017
2016
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude.
Secur. Commun. Networks, 2016
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing.
J. Ambient Intell. Humaniz. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing.
IACR Cryptol. ePrint Arch., 2016
2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
Wirel. Commun. Mob. Comput., 2015
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer.
Secur. Commun. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system.
EURASIP J. Adv. Signal Process., 2015
2014
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations.
IACR Cryptol. ePrint Arch., 2014
Affine Equivalency and Nonlinearity Preserving Bijective Mappings over 𝔽<sub>2</sub>.
Proceedings of the Arithmetic of Finite Fields - 5th International Workshop, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
2008
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Information Security, 10th International Conference, 2007