Takip et
Albert Levi
Albert Levi
sabanciuniv.edu üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
A survey on anonymity and privacy in bitcoin-like digital cash systems
MCK Khalilov, A Levi
IEEE Communications Surveys & Tutorials 20 (3), 2543-2585, 2018
3042018
Privacy preserving clustering on horizontally partitioned data
A Inan, SV Kaya, Y Saygın, E Savaş, AA Hintoğlu, A Levi
Data & Knowledge Engineering 63 (3), 646-666, 2007
1932007
A survey on ransomware: Evolution, taxonomy, and defense solutions
H Oz, A Aris, A Levi, AS Uluagac
ACM Computing Surveys (CSUR) 54 (11s), 1-37, 2022
1872022
Distributed privacy preserving k-means clustering with additive secret sharing
MC Doganay, TB Pedersen, Y Saygin, E Savaş, A Levi
Proceedings of the 2008 international workshop on Privacy and anonymity in …, 2008
1142008
Relay attacks on bluetooth authentication and solutions
A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan
Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004
952004
PUF-enhanced offline RFID security and privacy
S Kardaş, S Celik, M Yıldız, A Levi
Journal of Network and Computer Applications 35 (6), 2059-2067, 2012
692012
Public key cryptography based privacy preserving multi-context RFID infrastructure
SV Kaya, E Savaş, A Levi, Ö Erçetin
Ad Hoc Networks 7 (1), 136-152, 2009
622009
Deriving cryptographic keys from physiological signals
DK Altop, A Levi, V Tuzcu
Pervasive and Mobile Computing 39, 65-79, 2017
522017
Performance evaluation of public-key cryptosystem operations in WTLS protocol
A Levi, E Savas
Proceedings of the eighth IEEE symposium on computers and communications …, 2003
492003
Disclosure risks of distance preserving data transformations
EO Turgay, TB Pedersen, Y Saygın, E Savaş, A Levi
Scientific and Statistical Database Management: 20th International …, 2008
432008
Inside risks: Risks in email security
A Levi, CK Koç
Communications of the ACM 44 (8), 112, 2001
352001
An efficient, dynamic and trust preserving public key infrastructure
A Levi, MU Caglayan
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 203-214, 2000
352000
Two-tier anomaly detection based on traffic profiling of the home automation system
M Gajewski, JM Batalla, A Levi, C Togay, CX Mavromoustakis, ...
Computer Networks 158, 46-60, 2019
332019
Quarantine region scheme to mitigate spam attacks in wireless-sensor networks
V Coskun, E Cayirci, A Levi, S Sancak
IEEE transactions on mobile computing 5 (8), 1074-1086, 2006
312006
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
A Levi, MU Caglayan, CK Koc
ACM Transactions on Information and System Security (TISSEC) 7 (1), 21-59, 2004
312004
CONSEPP: Convenient and secure electronic payment protocol based on X9. 59
A Levi, CK Koc
Seventeenth Annual Computer Security Applications Conference, 286-295, 2001
312001
A new security and privacy framework for RFID in cloud computing
S Kardas, S Celik, MA Bingöl, A Levi
2013 IEEE 5th international conference on cloud computing technology and …, 2013
292013
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks
K Kalkan, S Yilmaz, OZ Yilmaz, A Levi
Proceedings of the 5th ACM symposium on QoS and security for wireless and …, 2009
282009
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach: This work is an extended version of Ergun, M., Levi, A. and Savas, E …
M Ergun, A Levi, E Savas
The Computer Journal 54 (4), 602-616, 2011
262011
Towards using physiological signals as cryptographic keys in body area networks
DK Altop, A Levi, V Tuzcu
2015 9th International Conference on Pervasive Computing Technologies for …, 2015
252015
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20