Gokay Saldamli
Gokay Saldamli
Verified email at sjsu.edu
Cited by
Cited by
Security Challenges in Cloud Computing.
L Ertaul, S Singhal, G Saldamli
Security and Management, 36-42, 2010
Elliptic and hyperelliptic curves on embedded μP
T Wollinger, J Pelzl, V Wittelsberger, C Paar, G Saldamli, ÇK Koç
ACM Transactions on Embedded Computing Systems (TECS) 3 (3), 509-533, 2004
Private proximity testing with an untrusted server
G Saldamli, R Chow, H Jin, B Knijnenburg
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Spectral modular exponentiation
G Saldamli, CK Koç
18th IEEE Symposium on Computer Arithmetic (ARITH'07), 123-132, 2007
Secure voice communication via GSM network
MA Ozkan, B Ors, G Saldamli
2011 7th International Conference on Electrical and Electronics Engineering …, 2011
Spectral modular arithmetic
G Saldamli
Reconsidering big data security and privacy in cloud and mobile cloud systems
AT Lo'ai, G Saldamli
Journal of King Saud University-Computer and Information Sciences, 2019
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption
D Bayhan, SB Ors, G Saldamli
The 2010 International Conference on Computer Engineering & Systems, 257-261, 2010
Homomorphic encryption in computing systems and environments
G Saldamli
US Patent 9,436,835, 2016
Implementation of a PUF Circuit on a FPGA
M Soybali, B Ors, G Saldamli
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Unbalanced states violates RFID privacy
I Erguler, E Anarim, G Saldamli
Journal of Intelligent Manufacturing 25 (2), 273-281, 2014
Recommendations-based location privacy control
H Jin, G Saldamli, R Chow, BP Knijnenburg
2013 IEEE International Conference on Pervasive Computing and Communications …, 2013
A salient missing link in rfid security protocols
I Erguler, E Anarim, G Saldamli
EURASIP Journal on Wireless Communications and Networking 2011, 1-9, 2011
Privacy in mobile personalized systems: The effect of disclosure justifications
BP Knijnenburg, A Kobsa, G Saldamli
SOUPS Workshop on Usable Privacy & Security in Mobile Devices, 11-13, 2012
Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP
I Erguler, C Unsal, E Anarim, G Saldamli
Security and Communication Networks 5 (3), 287-291, 2012
Analyzing and comparing the AES architectures for their power consumption
A Dogan, SB Ors, G Saldamli
Journal of Intelligent Manufacturing 25 (2), 263-271, 2014
Analyzing homomorphic encryption schemes in securing wireless sensor networks (WSN)
L Ertaul, JH Yang, G Saldamli
International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015
Differential data analysis for recommender systems
R Chow, H Jin, B Knijnenburg, G Saldamli
Proceedings of the 7th ACM conference on Recommender systems, 323-326, 2013
Architectures for fast modular multiplication
A Aris, B Ors, G Saldamli
2011 14th Euromicro Conference on Digital System Design, 434-437, 2011
Post-Quantum Cryptography on IoT: Merkle's Tree Authentication
G Saldamli, L Ertaul, B Kodirangaiah
Proceedings of the International Conference on Wireless Networks (ICWN), 35-41, 2018
The system can't perform the operation now. Try again later.
Articles 1–20