Selçuk Baktir

Orcid: 0000-0002-3478-5200

According to our database1, Selçuk Baktir authored at least 25 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Caller-ID Authentication (BBCA): A Novel Solution to Prevent Spoofing Attacks in VoIP/SIP Networks.
IEEE Access, 2024

2023
An ECC processor for IoT using Edwards curves and DFT modular multiplication.
Clust. Comput., April, 2023

Side-Channel Resistant 2048-Bit RSA Implementation for Wireless Sensor Networks and Internet of Things.
IEEE Access, 2023

2022
FFT enabled ECC for WSN nodes without hardware multiplier support.
Turkish J. Electr. Eng. Comput. Sci., January, 2022

2020
Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.
Sensors, 2020

A Novel SIP Based Distributed Reflection Denial-of-Service Attack and an Effective Defense Mechanism.
IEEE Access, 2020

2019
Implementing RSA for Wireless Sensor Nodes.
Sensors, 2019

A light-weight solution for blackhole attacks in wireless sensor networks.
Turkish J. Electr. Eng. Comput. Sci., 2019

2017
QoS-Aware MAC protocols utilizing sectored antenna for wireless sensor networks-based smart grid applications.
Int. J. Commun. Syst., 2017

2016
Elliptic-curve cryptography for wireless sensor network nodes without hardware multiplier support.
Secur. Commun. Networks, 2016

A novel data collection mechanism for smart grids using public transportation buses.
Comput. Stand. Interfaces, 2016

Novel session initiation protocol-based distributed denial-of-service attacks and effective defense strategies.
Comput. Secur., 2016

2014
Cloud Computing for Smart Grid applications.
Comput. Networks, 2014

Abused Android Permissions by Advertising Networks.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Privacy Preserving Smart Grid Management in the Cloud.
Proceedings of the 2014 International Conference on IT Convergence and Security, 2014

Elliptic Curve Cryptography on Constrained Microcontrollers Using Frequency Domain Arithmetic.
Proceedings of the Computational Science and Its Applications - ICCSA 2014 - 14th International Conference, Guimarães, Portugal, June 30, 2014

An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Practical Attacks on Mobile Cellular Networks and Possible Countermeasures.
Future Internet, 2013

2012
Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors.
IACR Cryptol. ePrint Arch., 2012

2008
Optimal Extension Field Inversion in the Frequency Domain.
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008

2007
A State-of-the-art Elliptic Curve Cryptographic Processor Operating in the Frequency Domain.
Mob. Networks Appl., 2007

Trojan Detection using IC Fingerprinting.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography.
Proceedings of the Computer and Information Sciences, 2006

Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2004
Optimal Tower Fields.
IEEE Trans. Computers, 2004


  Loading...