Browsing by Author Bıçakcı, Kemal

Showing results 45 to 64 of 72 < previous   next >
Issue DateTitleAuthor(s)
2012Metin ve grafiksel öğeleri birleştiren yeni bir parola tabanlı kimlik doğrulama yöntemiAkpulat, Murat
2010Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor NetworksTavlı, Bülent ; Özçiloğlu, M. Mikail; Bıçakcı, Kemal 
2014Mobile Authentication Secure Against Man-In-The-Middle AttacksBıçakcı, Kemal ; Ünal, Devrim; Aşcıoğlu, Nadir; Adalıer, Oktay
2011A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security EvaluationBıçakcı, Kemal ; van Oorschot, Paul C.
2013Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperationBıçakcı, Kemal ; Bağcı, İbrahim Ethem; Tavlı, Bülent ; Pala, Zeydin
2013Network lifetime maximization and localized routing tradeoff in wireless sensor networksUzun, Erkam; Aksaç, A.; Öztürk, O.; Kızılöz, H. E.; İncebacak, D.; Tavlı, Bülent ; Bıçakcı, Kemal 
2010NoTabNab: Protection against the "tabnabbing attack"Ünlü, S. A.; Bıçakcı, Kemal 
Dec-2019Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptographyBıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M.
2008Optimal Discretization for High-Entropy Graphical PasswordsBıçakcı, Kemal 
2013Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networksİncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın
2010Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networksBıçakcı, Kemal ; Tavlı, Bülent 
2009Pushing the limits of one-time signaturesBıçakcı, Kemal 
2017A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT SystemsAksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun
2010Resim şifre teknikleri: Deneysel karşılaştırma ve saha çalışmasıYıldız, Muhammed Raşit
2013Revisiting graphical passwords for augmenting, not replacing, text passwordsAkpulat M.; Bıçakcı, Kemal ; Cil U.
2012A second look at the performance of neural networks for keystroke dynamics using a publicly available datasetUzun, Yasin; Bıçakcı, Kemal 
2020Security Analysis of Mobile Authenticator ApplicationsÖzkan, C.; Bıçakcı, Kemal 
2007SHA: A secure voice activated smart home for quadriplegia patientsUzunay, Yusuf; Bıçakcı, Kemal 
2020A Survey of Denial-of-Service Attacks and Solutions in the Smart GridHuseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman
2012A survey of visual sensor network platformsTavlı, Bülent ; Bıçakcı, Kemal ; Zilan, Ruken; Barcelo-Ordinas, Jose M.