• Login
    Browsing by Author 
    •   DORA Home
    • Browsing by Author
    •   DORA Home
    • Browsing by Author
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Author "Kiraz, Mehmet Sabir"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-8 of 8

    • title
    • publication date
    • submission date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • CertLedger: A New PKI Model with Certi cate Transparency Based on Blockchain 

        Kubilay, Murat; Mantar, Haci Ali; Kiraz, Mehmet Sabir (Article)
        In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such issues, Google introduced ...
      • A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing 

        Kiraz, Mehmet Sabir (Article)
        The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in ...
      • An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates 

        Bingol, M.A.; Bicer, O.; Kiraz, Mehmet Sabir; Levi, A. (Article)
        Private function evaluation (PFE) is a special case of secure multi-party computation (MPC), where the function to be computed is known by only one party. PFE is useful in several real-life applications where an algorithm ...
      • Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations 

        Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)
        Reducing computational cost of cryptographic computations for resource-constrained devices is an active research area. One of the practical solutions is to securely outsource the computations to an external and more powerful ...
      • k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions 

        Celik, Serkan; Kiraz, Mehmet Sabir; Levi, Albert; Bingol, M.A.; Demirci, H.; Kardas, S. (Article)
        This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ...
      • Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer 

        Kiraz, Mehmet Sabir; Genc, Ziya Alper; Kardas, Suleyman (Article)
        Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious ...
      • Still Wrong Use of Pairings in Cryptography 

        Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)
        Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health ...
      • THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system 

        Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay (Article)
        In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where ...

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary
         

         

        Browse

        All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

        My Account

        Login

        Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
        DMU LIbrary