Seguir
Mehmet Sabir Kiraz
Mehmet Sabir Kiraz
Senior Lecturer and Programme Leader of Cyber Security, De Montfort University, UK
Dirección de correo verificada de dmu.ac.uk
Título
Citado por
Citado por
Año
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
MY Kubilay, MS Kiraz, HA Mantar
Computers & Security 85, 333-352, 2019
1432019
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux, 283-290, 2006
852006
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFIDSec 2011- 7th International Workshop, 78-93, 2012
692012
Examination of a New Defense Mechanism: Honeywords.
ZA Genc, S Kardas, MS Kiraz
Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013
61*2013
Still Wrong Use of Pairings in Cryptography
MS Kiraz, O Uzunkol
Elsevier-Applied Mathematics and Computation 333, 467–479, 2018
60*2018
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
542020
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
MS Kiraz, O Uzunkol
International Journal of Information Security, 1-19, 2015
482015
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
S Kardaş, M Akgün, MS Kiraz, H Demirci
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
472011
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
C Karabat, MS Kiraz, H Erdogan, E Savas
EURASIP Journal on Advances in Signal Processing Editorial Team, 2015
432015
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing
MS Kiraz
Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016
362016
Secure and Fair Two-Party Computation
MS Kiraz
Proc. of EUROCRYPT 3, 2008
262008
Efficient committed oblivious transfer of bit strings
MS Kiraz, B Schoenmakers, J Villegas
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
262007
An efficient protocol for fair secure two-party computation
MS Kiraz, B Schoenmakers
Cryptographers’ Track at the RSA Conference, 88-105, 2008
252008
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
O Biçer, MA Bingöl, MS Kiraz, A Levi
https://doi.org/10.1093/comjnl/bxy136 62 (4), 598–613, 2019
23*2019
Anonymous RFID authentication for cloud services
M Kiraz, M Bingöl, S Kardaş, F Birinci
international journal of information security science 1 (2), 32-42, 2012
212012
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 2020 (https://doi.org …, 2020
20*2020
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
MS Kiraz, ZA Genç, S Kardaş
Security and Communication Networks, 2015
172015
Secure database in cloud computing-cryptdb revisited
Z DAYIOĞLU
International Journal of Information Security Science 3 (1), 129-147, 2014
172014
Bitcoin'de mahremiyeti sağlama yöntemleri
S Kardaş, M KİRAZ
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 4 (1), 1-9, 2018
152018
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA Genç, E Öztürk
Cryptology ePrint Archive, 2017
142017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20