Folgen
Mehmet Sabir Kiraz
Mehmet Sabir Kiraz
Senior Lecturer and Programme Leader of Cyber Security, De Montfort University, UK
Bestätigte E-Mail-Adresse bei dmu.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
MY Kubilay, MS Kiraz, HA Mantar
Computers & Security 85, 333-352, 2019
1432019
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux, 283-290, 2006
842006
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFIDSec 2011- 7th International Workshop, 78-93, 2012
692012
Examination of a New Defense Mechanism: Honeywords.
ZA Genc, S Kardas, MS Kiraz
Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013
61*2013
Still Wrong Use of Pairings in Cryptography
MS Kiraz, O Uzunkol
Elsevier-Applied Mathematics and Computation 333, 467–479, 2018
60*2018
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
542020
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
MS Kiraz, O Uzunkol
International Journal of Information Security, 1-19, 2015
482015
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
S Kardaş, M Akgün, MS Kiraz, H Demirci
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
472011
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
C Karabat, MS Kiraz, H Erdogan, E Savas
EURASIP Journal on Advances in Signal Processing Editorial Team, 2015
432015
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing
MS Kiraz
Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016
362016
Secure and Fair Two-Party Computation
MS Kiraz
Proc. of EUROCRYPT 3, 2008
262008
Efficient committed oblivious transfer of bit strings
MS Kiraz, B Schoenmakers, J Villegas
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
262007
An efficient protocol for fair secure two-party computation
MS Kiraz, B Schoenmakers
Cryptographers’ Track at the RSA Conference, 88-105, 2008
252008
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
O Biçer, MA Bingöl, MS Kiraz, A Levi
https://doi.org/10.1093/comjnl/bxy136 62 (4), 598–613, 2019
23*2019
Anonymous RFID authentication for cloud services
M Kiraz, M Bingöl, S Kardaş, F Birinci
international journal of information security science 1 (2), 32-42, 2012
212012
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 2020 (https://doi.org …, 2020
20*2020
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
MS Kiraz, ZA Genç, S Kardaş
Security and Communication Networks, 2015
172015
Secure database in cloud computing-cryptdb revisited
Z DAYIOĞLU
International Journal of Information Security Science 3 (1), 129-147, 2014
172014
Bitcoin'de mahremiyeti sağlama yöntemleri
S Kardaş, M KİRAZ
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 4 (1), 1-9, 2018
152018
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA Genç, E Öztürk
Cryptology ePrint Archive, 2017
142017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20