Gokay Saldamli
Gokay Saldamli
Verified email at
Cited by
Cited by
Security Challenges in Cloud Computing.
L Ertaul, S Singhal, G Saldamli
Security and Management, 36-42, 2010
Reconsidering big data security and privacy in cloud and mobile cloud systems
AT Lo'ai, G Saldamli
Journal of King Saud University-Computer and Information Sciences 33 (7 …, 2021
Elliptic and hyperelliptic curves on embedded μP
T Wollinger, J Pelzl, V Wittelsberger, C Paar, G Saldamli, ÇK Koç
ACM Transactions on Embedded Computing Systems (TECS) 3 (3), 509-533, 2004
Private proximity testing with an untrusted server
G Saldamli, R Chow, H Jin, B Knijnenburg
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Health care insurance fraud detection using blockchain
G Saldamli, V Reddy, KS Bojja, MK Gururaja, Y Doddaveerappa, ...
2020 Seventh international conference on software defined systems (SDS), 145-152, 2020
Spectral modular exponentiation
G Saldamli, CK Koç
18th IEEE Symposium on Computer Arithmetic (ARITH'07), 123-132, 2007
Secure voice communication via GSM network
MA Ozkan, B Ors, G Saldamli
2011 7th International Conference on Electrical and Electronics Engineering …, 2011
Predicting and preventing cyber attacks during COVID-19 time using data analysis and proposed secure IoT layered model
F Muheidat, M Tawalbeh, M Quwaider, G Saldamli
2020 Fourth International Conference on Multimedia Computing, Networking and …, 2020
Implementation of a PUF circuit on a FPGA
M Soybali, B Ors, G Saldamli
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Homomorphic encryption in computing systems and environments
G Saldamli
US Patent 9,436,835, 2016
Spectral modular arithmetic
G Saldamli
Oregon State University, 2006
Analyzing and comparing the AES architectures for their power consumption
A Dogan, SB Ors, G Saldamli
Journal of Intelligent Manufacturing 25, 263-271, 2014
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption
D Bayhan, SB Ors, G Saldamli
The 2010 International Conference on Computer Engineering & Systems, 257-261, 2010
Differential data analysis for recommender systems
R Chow, H Jin, B Knijnenburg, G Saldamli
Proceedings of the 7th ACM Conference on Recommender Systems, 323-326, 2013
Analysis of lightweight message authentication codes for IoT environments
G Saldamli, L Ertaul, A Shankaralingappa
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC …, 2019
Recommendations-based location privacy control
H Jin, G Saldamli, R Chow, BP Knijnenburg
2013 IEEE International Conference on Pervasive Computing and Communications …, 2013
Wildfire detection using wireless mesh network
G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul
2019 Fourth international conference on fog and mobile edge computing (FMEC …, 2019
Partially reconfigurable IP protection system with ring oscillator based physically unclonable functions
E Abtioglu, R Yeniçeri, B Gövem, E Göncü, ME Yalçin, G Saldamli
2017 New Generation of CAS (NGCAS), 65-68, 2017
Unbalanced states violates RFID privacy
I Erguler, E Anarim, G Saldamli
Journal of Intelligent Manufacturing 25, 273-281, 2014
Privacy in mobile personalized systems: The effect of disclosure justifications
BP Knijnenburg, A Kobsa, G Saldamli
Proceedings of the SOUPS 2012 Workshop on Usable Privacy & Security for …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20