| Issue Date | Title | Author(s) |
21 | 2015 | Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs | Uludağ, Süleyman; Ballı, Muhammed Fatih; Selçuk, Ali Aydın ; Tavlı, Bülent |
22 | 1-Jun-2015 | Punctured interval broadcast encryption scheme with free riders | Ak, Murat; Selçuk, Ali Aydın |
23 | 1-Sep-2018 | Server notaries: A complementary approach to the web PKI trust model | Yüce, Emre; Selçuk, Ali Aydın |
24 | 15-Mar-2014 | Sharing DSS by the Chinese Remainder Theorem | Kaya, Kamer; Selçuk, Ali Aydın |
25 | 2021 | SoK: Cryptojacking malware | Tekiner, Ege; Acar, A. ; Uluagac, A. Selçuk; Kırda, E.; Selçuk, Ali Aydın |
26 | 2021 | A Study on Exploitable DRDoS Amplifiers in Europe | Ercan, Emre Murat; Selçuk, Ali Aydın |
27 | Sep-2019 | A study on public perception and preferences about IoT security | Tok, Mevlüt Serkan; Selçuk, Ali Aydın |
28 | 2013 | Trusting SSL in practice | Selçuk, Ali Aydın |
29 | 2017 | Undecidable Problems in Malware Analysis | Selçuk, Ali Aydın ; Orhan, Fatih; Batur, Berker |
30 | Jul-2018 | Usability of authentication mechanisms in secure messaging applications | Akman, Gamze; Selçuk, Ali Aydın |