A survey on anonymity and privacy in bitcoin-like digital cash systems MCK Khalilov, A Levi IEEE Communications Surveys & Tutorials 20 (3), 2543-2585, 2018 | 322 | 2018 |
A survey on ransomware: Evolution, taxonomy, and defense solutions H Oz, A Aris, A Levi, AS Uluagac ACM Computing Surveys (CSUR) 54 (11s), 1-37, 2022 | 262 | 2022 |
Privacy preserving clustering on horizontally partitioned data A Inan, SV Kaya, Y Saygın, E Savaş, AA Hintoğlu, A Levi Data & Knowledge Engineering 63 (3), 646-666, 2007 | 194 | 2007 |
Distributed privacy preserving k-means clustering with additive secret sharing MC Doganay, TB Pedersen, Y Saygin, E Savaş, A Levi Proceedings of the 2008 international workshop on Privacy and anonymity in …, 2008 | 112 | 2008 |
Relay attacks on bluetooth authentication and solutions A Levi, E Çetintaş, M Aydos, ÇK Koç, MU Çağlayan Computer and Information Sciences-ISCIS 2004: 19th International Symposium …, 2004 | 97 | 2004 |
PUF-enhanced offline RFID security and privacy S Kardaş, S Celik, M Yıldız, A Levi Journal of Network and Computer Applications 35 (6), 2059-2067, 2012 | 74 | 2012 |
Public key cryptography based privacy preserving multi-context RFID infrastructure SV Kaya, E Savaş, A Levi, Ö Erçetin Ad Hoc Networks 7 (1), 136-152, 2009 | 62 | 2009 |
Deriving cryptographic keys from physiological signals DK Altop, A Levi, V Tuzcu Pervasive and Mobile Computing 39, 65-79, 2017 | 49 | 2017 |
Performance evaluation of public-key cryptosystem operations in WTLS protocol A Levi, E Savas Proceedings of the eighth IEEE symposium on computers and communications …, 2003 | 49 | 2003 |
Disclosure risks of distance preserving data transformations EO Turgay, TB Pedersen, Y Saygın, E Savaş, A Levi Scientific and Statistical Database Management: 20th International …, 2008 | 42 | 2008 |
Inside risks: Risks in email security A Levi, CK Koç Communications of the ACM 44 (8), 112, 2001 | 34 | 2001 |
An efficient, dynamic and trust preserving public key infrastructure A Levi, MU Caglayan Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 203-214, 2000 | 34 | 2000 |
Two-tier anomaly detection based on traffic profiling of the home automation system M Gajewski, JM Batalla, A Levi, C Togay, CX Mavromoustakis, ... Computer Networks 158, 46-60, 2019 | 33 | 2019 |
A new security and privacy framework for RFID in cloud computing S Kardas, S Celik, MA Bingöl, A Levi 2013 IEEE 5th international conference on cloud computing technology and …, 2013 | 33 | 2013 |
Quarantine region scheme to mitigate spam attacks in wireless-sensor networks V Coskun, E Cayirci, A Levi, S Sancak IEEE transactions on mobile computing 5 (8), 1074-1086, 2006 | 31 | 2006 |
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure A Levi, MU Caglayan, CK Koc ACM Transactions on Information and System Security (TISSEC) 7 (1), 21-59, 2004 | 30 | 2004 |
CONSEPP: Convenient and secure electronic payment protocol based on X9. 59 A Levi, CK Koc Seventeenth Annual Computer Security Applications Conference, 286-295, 2001 | 30 | 2001 |
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks K Kalkan, S Yilmaz, OZ Yilmaz, A Levi Proceedings of the 5th ACM symposium on QoS and security for wireless and …, 2009 | 29 | 2009 |
The problem of trusted third party in authentication and digital signature protocols A Levi, MU Caglayan Proceedings of the 12th International Symposium on Computer and Information …, 1997 | 29 | 1997 |
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach: This work is an extended version of Ergun, M., Levi, A. and Savas, E … M Ergun, A Levi, E Savas The Computer Journal 54 (4), 602-616, 2011 | 27 | 2011 |