Author of the publication

DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.

, , , and . Ad Hoc Networks, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Efficient and Reusable Private Function Evaluation with Linear Complexity., , and . IACR Cryptology ePrint Archive, (2018)Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography., , , and . IEEE Trans. Mob. Comput., 12 (10): 2037-2049 (2013)A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption., , , , and . AFRICACRYPT, volume 13503 of Lecture Notes in Computer Science, page 425-447. Springer Nature Switzerland, (2022)Efficient and secure schemes for private function evaluation (Gizli fonksiyon değerlendirme için verimli ve güvenli şemalar). Sabancı University, Turkey, (2019)Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates., , , and . IACR Cryptology ePrint Archive, (2017)Optimal Security Limits of RFID Distance Bounding Protocols., , , and . RFIDSec, volume 6370 of Lecture Notes in Computer Science, page 220-238. Springer, (2010)Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment., and . IACR Cryptol. ePrint Arch., (2021)A New Security and Privacy Framework for RFID in Cloud Computing., , , and . CloudCom (1), page 171-176. IEEE Computer Society, (2013)Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity., , , and . IEEE Trans. Dependable Secur. Comput., 19 (2): 835-847 (2022)A framework for analyzing RFID distance bounding protocols., , , , and . Journal of Computer Security, 19 (2): 289-317 (2011)