Muhammed Ali Bingöl

Orcid: 0000-0002-5930-0521

According to our database1, Muhammed Ali Bingöl authored at least 21 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FlexHi: A Flexible Hierarchical Threshold.
IACR Cryptol. ePrint Arch., 2024

Multi-party Setup Ceremony for Generating Tokamak zk-SNARK Parameters.
IACR Cryptol. ePrint Arch., 2024

FlexHi: A Flexible Hierarchical Threshold Signature Scheme.
Proceedings of the Intelligent Computing, 2024

2022
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity.
IEEE Trans. Dependable Secur. Comput., 2022

Security and Privacy Analysis of Recently Proposed ECC-Based RFID Authentication Schemes.
IACR Cryptol. ePrint Arch., 2022

A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption.
Proceedings of the Progress in Cryptology, 2022

2021
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment.
IACR Cryptol. ePrint Arch., 2021

2019
Efficient and secure schemes for private function evaluation (Gizli fonksiyon değerlendirme için verimli ve güvenli şemalar)
PhD thesis, 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
Comput. J., 2019

2018
Highly Efficient and Reusable Private Function Evaluation with Linear Complexity.
IACR Cryptol. ePrint Arch., 2018

2017
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
IACR Cryptol. ePrint Arch., 2017

DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.
Ad Hoc Networks, 2017

2016
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude.
Secur. Commun. Networks, 2016

2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
Wirel. Commun. Mob. Comput., 2015

2013
Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography.
IEEE Trans. Mob. Comput., 2013

Deploying OSK on Low-Resource Mobile Devices.
Proceedings of the Radio Frequency Identification, 2013

A New Security and Privacy Framework for RFID in Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2011
A framework for analyzing RFID distance bounding protocols.
J. Comput. Secur., 2011

A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
Optimal Security Limits of RFID Distance Bounding Protocols.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010


  Loading...