Ali Aydin Selcuk
Ali Aydin Selcuk
Professor of Computer Engineering, TOBB University of Economics and Technology, Ankara
Verified email at etu.edu.tr - Homepage
Title
Cited by
Cited by
Year
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
4012004
On probability of success in linear and differential cryptanalysis
AA Selçuk
Journal of Cryptology 21 (1), 131-147, 2008
252*2008
A meet-in-the-middle attack on 8-round AES
H Demirci, AA Selçuk
International Workshop on Fast Software Encryption, 116-126, 2008
1892008
Threshold cryptography based on Asmuth–Bloom secret sharing
K Kaya, AA Selçuk
Information sciences 177 (19), 4148-4160, 2007
872007
A verifiable secret sharing scheme based on the Chinese remainder theorem
K Kaya, AA Selçuk
International Conference on Cryptology in India, 414-425, 2008
522008
A new meet-in-the-middle attack on the IDEA block cipher
H Demirci, AA Selçuk, E Türe
International Workshop on Selected Areas in Cryptography, 117-129, 2003
442003
New results in linear cryptanalysis of RC5
AA Selçuk
International Workshop on Fast Software Encryption, 1-16, 1998
441998
Threshold cryptography based on blakely secret sharing
IN Bozkurt, K Kaya, AA Selcuk, AM Güloglu
Information Sciences, 1-4, 2008
392008
Initialization vector attacks on the IPsec protocol suite
CB McCubbin, AA Selçuk, D Sidhu
Proceedings IEEE 9th International Workshops on Enabling Technologies …, 2000
272000
GLP: A cryptographic approach for group location privacy
M Ashouri-Talouki, A Baraani-Dastjerdi, AAN SelçUk
Computer Communications 35 (12), 1527-1533, 2012
252012
Improved DST cryptanalysis of IDEA
ES Ayaz, AA Selçuk
International Workshop on Selected Areas in Cryptography, 1-14, 2006
242006
Robust threshold schemes based on the Chinese remainder theorem
K Kaya, AA Selçuk
International Conference on Cryptology in Africa, 94-108, 2008
212008
Probabilistic optimization techniques for multicast key management
AA Selçuk, D Sidhu
Computer Networks 40 (2), 219-234, 2002
212002
Probabilistic optimization of LKH-based multicast key distribution schemes
A Selcuk, C McCubbin, D Sidhu
Draft-selcuk-probabilistic-Ikh-01. txt, Internet Draft, 2000
162000
Optimal subset-difference broadcast encryption with free riders
M Ak, K Kaya, AA Selçuk
Information Sciences 179 (20), 3673-3684, 2009
152009
Distributed multi-unit privacy assured bidding (PAB) for smart grid demand response programs
MF Balli, S Uludag, AA Selcuk, B Tavli
IEEE Transactions on Smart grid 9 (5), 4119-4127, 2017
142017
Threshold cryptography based on Asmuth-Bloom secret sharing
K Kaya, AA Selçuk, Z Tezcan
International Symposium on Computer and Information Sciences, 935-942, 2006
142006
The cloaked-centroid protocol: location privacy protection for a group of users of location-based services
M Ashouri-Talouki, A Baraani-Dastjerdi, AA Selçuk
Knowledge and Information Systems 45 (3), 589-615, 2015
132015
Practical threshold signatures with linear secret sharing schemes
IN Bozkurt, K Kaya, AA Selçuk
International Conference on Cryptology in Africa, 167-178, 2009
132009
A strong user authentication protocol for GSM
O Aydemir, A Selguk
14th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2005
132005
The system can't perform the operation now. Try again later.
Articles 1–20