Author of the publication

On the trace based public key cryptosystems over finite fields ; Sonlu cisimler üzerinde iz tabanlı açık anahtarlı kriptosistemler üzerine.

. Middle East Technical University, Çankaya, Ankara, Turkey, (2013)base-search.net (ftmetuankair:oai:https://open.metu.edu.tr:11511/22836).

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Effects of Reduced Gravity and Radiative Heat Transfer on the Magnetohydrodynamic Flow Past a Non-Rotating Stationary Sphere Surrounded by a Porous Medium., , , , , and . Symmetry, 15 (4): 806 (March 2023)Global incidence, prevalence, years lived with disability (YLDs), disability-adjusted life-years (DALYs), and healthy life expectancy (HALE) for 371 diseases and injuries in 204 countries and territories and 811 subnational locations, 1990–2021: a systematic analysis for the Global Burden of Disease Study 2021, , , , , , , , , and 1318 other author(s). (2024)Parametric analysis of multi section slot coupled quadrature coupler., , , and . CCECE, page 1-4. IEEE, (2012)A Machine Learning-Based Model for the Detection of Skin Cancer Using YOLOv10., , , , and . ICSIPA, page 1-6. IEEE, (2024)Optimal control of power cost and consumer satisfaction using smart grid intelligent energy management system., , , and . ASCC, page 1-6. IEEE, (2015)System Generated Recommendation Vs Consumer Generated Recommendation: A Differential Effect on Consumers Beliefs and Behavior in e-Commerce Transactions., , and . PACIS, page 108. (2017)Effects of Post-Adoption Beliefs on the Online Product Recommendation continuance: an Extension of is continuance Model., , and . PACIS, page 130. (2016)GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures., , , , , , , and . IEEE Access, (2023)The role of continuous trust in usage of online product recommendations., , , , , , and . Online Inf. Rev., 44 (4): 745-766 (2020)BBAD: Blockchain-Backed Assault Detection for Cyber Physical Systems., , , , , , and . IEEE Access, (2024)