Browsing by Author Bıçakcı, Kemal

Showing results 52 to 71 of 72 < previous   next >
Issue DateTitleAuthor(s)
Dec-2019Open-TEE is no longer virtual: Towards software-only trusted execution environments using white-box cryptographyBıçakcı, Kemal ; Ak, I. K.; Özdemir, B. A.; Gözütok, M.
2008Optimal Discretization for High-Entropy Graphical PasswordsBıçakcı, Kemal 
2013Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networksİncebacak, Davut; Tavlı, Bülent ; Bıçakcı, Kemal ; Kayhan, Ayşegül Altın
2010Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networksBıçakcı, Kemal ; Tavlı, Bülent 
2009Pushing the limits of one-time signaturesBıçakcı, Kemal 
2017A Quantitative CVSS-Based Cyber Security Risk Assessment Methodology For IT SystemsAksu, M. Uğur; Dilek, M. Hadi; Tatli, E. Islam; Bıçakcı, Kemal ; Dirik, H. İbrahim; Demirezen, M. Umut; Aykir, Tayfun
2010Resim şifre teknikleri: Deneysel karşılaştırma ve saha çalışmasıYıldız, Muhammed Raşit
2013Revisiting graphical passwords for augmenting, not replacing, text passwordsAkpulat M.; Bıçakcı, Kemal ; Cil U.
2012A second look at the performance of neural networks for keystroke dynamics using a publicly available datasetUzun, Yasin; Bıçakcı, Kemal 
2020Security Analysis of Mobile Authenticator ApplicationsÖzkan, C.; Bıçakcı, Kemal 
2007SHA: A secure voice activated smart home for quadriplegia patientsUzunay, Yusuf; Bıçakcı, Kemal 
2020A Survey of Denial-of-Service Attacks and Solutions in the Smart GridHuseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman
2012A survey of visual sensor network platformsTavlı, Bülent ; Bıçakcı, Kemal ; Zilan, Ruken; Barcelo-Ordinas, Jose M.
2018A Taxonomy of the Emerging Denial-of-Service Attacks in the Smart Grid and CountermeasuresHuseinovic, Alvin; Mrdovic, Sasa; Bıçakcı, Kemal ; Uludağ, Süleyman
2015Towards Making Accessible Human-Interaction Proofs More Secure and UsableKızılöz, Hakan Ezgi; Bıçakcı, Kemal 
2009Towards Usable Solutions to Graphical Password Hotspot ProblemBıçakcı, Kemal ; Atalay, Nart Bedin ; Yüceel, Mustafa; Gürbaşlar, Hakan; Erdeniz, Burak
2014Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted ComputingUzunay, Yusuf; Bıçakcı, Kemal 
2016TwinCloud: Secure Cloud Sharing Without Explicit Key ManagementBıçakcı, Kemal ; Yavuz, Davut Deniz; Gürkan, Sezin
2013Uncovering the impact of minimum-energy routing on lifetime of wireless sensor networksSöylev, A.; Bıçakcı, Kemal ; Tavlı, Bülent 
Jan-2020Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLsAydın, M. Akif; Bütün, İsmail; Bıçakcı, Kemal ; Baykal, N.