Mehmet Sabir Kiraz
Mehmet Sabir Kiraz
Senior Lecturer and Programme Leader of Cyber Security, De Montfort University, UK
Verified email at
Cited by
Cited by
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
MY Kubilay, MS Kiraz, HA Mantar
Computers & Security 85, 333-352, 2019
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux, 283-290, 2006
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFIDSec 2011- 7th International Workshop, 78-93, 2012
Still Wrong Use of Pairings in Cryptography
MS Kiraz, O Uzunkol
Elsevier-Applied Mathematics and Computation 333, 467–479, 2018
Examination of a New Defense Mechanism: Honeywords.
ZA Genc, S Kardas, MS Kiraz
Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
S Kardaş, M Akgün, MS Kiraz, H Demirci
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
MS Kiraz, O Uzunkol
International Journal of Information Security, 1-19, 2015
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
C Karabat, MS Kiraz, H Erdogan, E Savas
EURASIP Journal on Advances in Signal Processing Editorial Team, 2015
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing
MS Kiraz
Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016
Secure and Fair Two-Party Computation
MS Kiraz
Proc. of EUROCRYPT 3, 2008
An efficient protocol for fair secure two-party computation
MS Kiraz, B Schoenmakers
Cryptographers’ Track at the RSA Conference, 88-105, 2008
Efficient committed oblivious transfer of bit strings
MS Kiraz, B Schoenmakers, J Villegas
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
O Biçer, MA Bingöl, MS Kiraz, A Levi 62 (4), 598–613, 2019
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 2020 ( …, 2020
Anonymous RFID authentication for cloud services
M Kiraz, M Bingöl, S Kardaş, F Birinci
international journal of information security science 1 (2), 32-42, 2012
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
MS Kiraz, ZA Genç, S Kardaş
Security and Communication Networks, 2015
Secure database in cloud computing-cryptdb revisited
Z Dayıoğlu
International Journal of Information Security Science 3 (1), 129-147, 2014
Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
MS AlMarshoud, AH Al-Bayatti, MS Kiraz
Vehicular Communications 36, 100490, 2022
KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures
HAM Murat Yasin Kubilay, Mehmet Sabir Kiraz
The Computer Journal, 21, 2020
The system can't perform the operation now. Try again later.
Articles 1–20