Security Challenges in Cloud Computing. L Ertaul, S Singhal, G Saldamli Security and Management, 36-42, 2010 | 89 | 2010 |
Elliptic and hyperelliptic curves on embedded μP T Wollinger, J Pelzl, V Wittelsberger, C Paar, G Saldamli, ÇK Koç ACM Transactions on Embedded Computing Systems (TECS) 3 (3), 509-533, 2004 | 49 | 2004 |
Reconsidering big data security and privacy in cloud and mobile cloud systems AT Lo'ai, G Saldamli Journal of King Saud University-Computer and Information Sciences 33 (7 …, 2021 | 36 | 2021 |
Private proximity testing with an untrusted server G Saldamli, R Chow, H Jin, B Knijnenburg Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 33 | 2013 |
Secure voice communication via GSM network MA Ozkan, B Ors, G Saldamli 2011 7th International Conference on Electrical and Electronics Engineering …, 2011 | 25 | 2011 |
Spectral modular exponentiation G Saldamli, CK Koç 18th IEEE Symposium on Computer Arithmetic (ARITH'07), 123-132, 2007 | 24 | 2007 |
Health care insurance fraud detection using blockchain G Saldamli, V Reddy, KS Bojja, MK Gururaja, Y Doddaveerappa, ... 2020 Seventh International Conference on Software Defined Systems (SDS), 145-152, 2020 | 17 | 2020 |
Implementation of a PUF circuit on a FPGA M Soybali, B Ors, G Saldamli 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 15 | 2011 |
Spectral modular arithmetic G Saldamli Oregon State University, 2006 | 15 | 2006 |
Predicting and preventing cyber attacks during covid-19 time using data analysis and proposed secure iot layered model F Muheidat, M Tawalbeh, M Quwaider, G Saldamli 2020 Fourth International Conference on Multimedia Computing, Networking and …, 2020 | 13 | 2020 |
Homomorphic encryption in computing systems and environments G Saldamli US Patent 9,436,835, 2016 | 13 | 2016 |
Analyzing and comparing the AES architectures for their power consumption A Dogan, SB Ors, G Saldamli Journal of Intelligent Manufacturing 25 (2), 263-271, 2014 | 12 | 2014 |
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption D Bayhan, SB Ors, G Saldamli The 2010 International Conference on Computer Engineering & Systems, 257-261, 2010 | 12 | 2010 |
Wildfire detection using wireless mesh network G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC …, 2019 | 9 | 2019 |
Unbalanced states violates RFID privacy I Erguler, E Anarim, G Saldamli Journal of Intelligent Manufacturing 25 (2), 273-281, 2014 | 9 | 2014 |
Differential data analysis for recommender systems R Chow, H Jin, B Knijnenburg, G Saldamli Proceedings of the 7th ACM conference on Recommender systems, 323-326, 2013 | 9 | 2013 |
Recommendations-based location privacy control H Jin, G Saldamli, R Chow, BP Knijnenburg 2013 IEEE International Conference on Pervasive Computing and Communications …, 2013 | 9 | 2013 |
Privacy in mobile personalized systems: The effect of disclosure justifications BP Knijnenburg, A Kobsa, G Saldamli Proceedings of the SOUPS 2012 Workshop on Usable Privacy & Security for …, 2012 | 9 | 2012 |
Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP I Erguler, C Unsal, E Anarim, G Saldamli Security and Communication Networks 5 (3), 287-291, 2012 | 9 | 2012 |
A salient missing link in rfid security protocols I Erguler, E Anarim, G Saldamli EURASIP Journal on Wireless Communications and Networking 2011, 1-9, 2011 | 9 | 2011 |