Seguir
Mehmet Sabir Kiraz
Mehmet Sabir Kiraz
Senior Lecturer and Programme Leader of Cyber Security, De Montfort University, UK
Email confirmado em dmu.ac.uk
Título
Citado por
Citado por
Ano
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
MY Kubilay, MS Kiraz, HA Mantar
Computers & Security 85, 333-352, 2019
1492019
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux, 283-290, 2006
852006
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFIDSec 2011- 7th International Workshop, 78-93, 2012
692012
Still Wrong Use of Pairings in Cryptography
MS Kiraz, O Uzunkol
Elsevier-Applied Mathematics and Computation 333, 467–479, 2018
62*2018
Examination of a New Defense Mechanism: Honeywords.
ZA Genc, S Kardas, MS Kiraz
Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013
62*2013
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
572020
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
MS Kiraz, O Uzunkol
International Journal of Information Security, 1-19, 2015
482015
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
S Kardaş, M Akgün, MS Kiraz, H Demirci
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
472011
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
C Karabat, MS Kiraz, H Erdogan, E Savas
EURASIP Journal on Advances in Signal Processing Editorial Team, 2015
422015
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing
MS Kiraz
Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016
382016
Secure and Fair Two-Party Computation
MS Kiraz
Proc. of EUROCRYPT 3, 2008
262008
Efficient committed oblivious transfer of bit strings
MS Kiraz, B Schoenmakers, J Villegas
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
262007
An efficient protocol for fair secure two-party computation
MS Kiraz, B Schoenmakers
Cryptographers’ Track at the RSA Conference, 88-105, 2008
252008
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
O Biçer, MA Bingöl, MS Kiraz, A Levi
https://doi.org/10.1093/comjnl/bxy136 62 (4), 598–613, 2019
24*2019
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 2020 (https://doi.org …, 2020
21*2020
Anonymous RFID authentication for cloud services
M Kiraz, M Bingöl, S Kardaş, F Birinci
international journal of information security science 1 (2), 32-42, 2012
212012
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
MS Kiraz, ZA Genç, S Kardaş
Security and Communication Networks, 2015
182015
Secure database in cloud computing-cryptdb revisited
Z Dayıoğlu
International Journal of Information Security Science 3 (1), 129-147, 2014
172014
Bitcoin'de mahremiyeti sağlama yöntemleri
S Kardaş, M KİRAZ
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 4 (1), 1-9, 2018
152018
Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
MS AlMarshoud, AH Al-Bayatti, MS Kiraz
Vehicular Communications 36, 100490, 2022
142022
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20