Gokay Saldamli
Gokay Saldamli
Verified email at sjsu.edu
Cited by
Cited by
Security Challenges in Cloud Computing.
L Ertaul, S Singhal, G Saldamli
Security and Management, 36-42, 2010
Elliptic and hyperelliptic curves on embedded μP
T Wollinger, J Pelzl, V Wittelsberger, C Paar, G Saldamli, ÇK Koç
ACM Transactions on Embedded Computing Systems (TECS) 3 (3), 509-533, 2004
Private proximity testing with an untrusted server
G Saldamli, R Chow, H Jin, B Knijnenburg
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
Reconsidering big data security and privacy in cloud and mobile cloud systems
AT Lo'ai, G Saldamli
Journal of King Saud University-Computer and Information Sciences, 2019
Secure voice communication via GSM network
MA Ozkan, B Ors, G Saldamli
2011 7th International Conference on Electrical and Electronics Engineering …, 2011
Spectral modular exponentiation
G Saldamli, CK Koç
18th IEEE Symposium on Computer Arithmetic (ARITH'07), 123-132, 2007
Spectral modular arithmetic
G Saldamli
Oregon State University, 2006
Implementation of a PUF circuit on a FPGA
M Soybali, B Ors, G Saldamli
2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011
Homomorphic encryption in computing systems and environments
G Saldamli
US Patent 9,436,835, 2016
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption
D Bayhan, SB Ors, G Saldamli
The 2010 International Conference on Computer Engineering & Systems, 257-261, 2010
Unbalanced states violates RFID privacy
I Erguler, E Anarim, G Saldamli
Journal of Intelligent Manufacturing 25 (2), 273-281, 2014
Recommendations-based location privacy control
H Jin, G Saldamli, R Chow, BP Knijnenburg
2013 IEEE International Conference on Pervasive Computing and Communications …, 2013
Privacy in mobile personalized systems: The effect of disclosure justifications
BP Knijnenburg, A Kobsa, G Saldamli
Proceedings of the SOUPS 2012 Workshop on Usable Privacy & Security for …, 2012
Health Care Insurance Fraud Detection Using Blockchain
G Saldamli, V Reddy, KS Bojja, MK Gururaja, Y Doddaveerappa, ...
2020 Seventh International Conference on Software Defined Systems (SDS), 145-152, 2020
Wildfire detection using wireless mesh network
G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC …, 2019
Vectorial private equality testing
G Saldamli, R Chow, H Jin, B Knijnenburg
US Patent 9,390,271, 2016
Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP
I Erguler, C Unsal, E Anarim, G Saldamli
Security and Communication Networks 5 (3), 287-291, 2012
A salient missing link in rfid security protocols
I Erguler, E Anarim, G Saldamli
EURASIP Journal on Wireless Communications and Networking 2011, 1-9, 2011
Analyzing and comparing the AES architectures for their power consumption
A Dogan, SB Ors, G Saldamli
Journal of Intelligent Manufacturing 25 (2), 263-271, 2014
Differential data analysis for recommender systems
R Chow, H Jin, B Knijnenburg, G Saldamli
Proceedings of the 7th ACM conference on Recommender systems, 323-326, 2013
The system can't perform the operation now. Try again later.
Articles 1–20