BibTeX records: Kemal Bicakci

download as .bib file

@article{DBLP:journals/adhoc/YildizBTGI16,
  author    = {Huseyin Ugur Yildiz and
               Kemal Bicakci and
               B{\"{u}}lent Tavli and
               Hakan Gultekin and
               Davut Incebacak},
  title     = {Maximizing Wireless Sensor Network lifetime by communication/computation
               energy optimization of non-repudiation security service: Node level
               versus network level strategies},
  journal   = {Ad Hoc Networks},
  volume    = {37},
  pages     = {301--323},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.adhoc.2015.08.026},
  doi       = {10.1016/j.adhoc.2015.08.026},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/adhoc/YildizBTGI16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijmms/BicakciK16,
  author    = {Kemal Bicakci and
               Hakan Ezgi Kiziloz},
  title     = {Leveraging human computation for pure-text Human Interaction Proofs},
  journal   = {Int. J. Hum.-Comput. Stud.},
  volume    = {92-93},
  pages     = {44--54},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.ijhcs.2016.04.007},
  doi       = {10.1016/j.ijhcs.2016.04.007},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ijmms/BicakciK16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/cns/BicakciYG16,
  author    = {Kemal Bicakci and
               Davut Deniz Yavuz and
               Sezin Gurkan},
  title     = {TwinCloud: Secure cloud sharing without explicit key management},
  booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages     = {581--585},
  year      = {2016},
  crossref  = {DBLP:conf/cns/2016},
  url       = {https://doi.org/10.1109/CNS.2016.7860552},
  doi       = {10.1109/CNS.2016.7860552},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cns/BicakciYG16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BicakciYG16,
  author    = {Kemal Bicakci and
               Davut Deniz Yavuz and
               Sezin Gurkan},
  title     = {TwinCloud: {A} Client-Side Encryption Solution for Secure Sharing
               on Clouds Without Explicit Key Management},
  journal   = {CoRR},
  volume    = {abs/1606.04705},
  year      = {2016},
  url       = {http://arxiv.org/abs/1606.04705},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/BicakciYG16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cee/PalaBT15,
  author    = {Zeydin Pala and
               Kemal Bicakci and
               Mustafa T{\"{u}}rk},
  title     = {Effects of node mobility on energy balancing in wireless networks},
  journal   = {Computers {\&} Electrical Engineering},
  volume    = {41},
  pages     = {314--324},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.compeleceng.2014.05.015},
  doi       = {10.1016/j.compeleceng.2014.05.015},
  timestamp = {Sat, 02 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cee/PalaBT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/IncebacakBT15,
  author    = {Davut Incebacak and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Evaluating energy cost of route diversity for security in wireless
               sensor networks},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {39},
  pages     = {44--57},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.csi.2014.12.003},
  doi       = {10.1016/j.csi.2014.12.003},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/csi/IncebacakBT15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iscc/KizilozB15,
  author    = {Hakan Ezgi Kiziloz and
               Kemal Bicakci},
  title     = {Towards making accessible human-interaction proofs more secure and
               usable},
  booktitle = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015,
               Larnaca, Cyprus, July 6-9, 2015},
  pages     = {607--612},
  year      = {2015},
  crossref  = {DBLP:conf/iscc/2015},
  url       = {https://doi.org/10.1109/ISCC.2015.7405581},
  doi       = {10.1109/ISCC.2015.7405581},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/KizilozB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/UzunB15,
  author    = {Yasin Uzun and
               Kemal Bicakci},
  title     = {Could We Distinguish Child Users from Adults Using Keystroke Dynamics?},
  journal   = {CoRR},
  volume    = {abs/1511.05672},
  year      = {2015},
  url       = {http://arxiv.org/abs/1511.05672},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/UzunB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/UzunayB15,
  author    = {Yusuf Uzunay and
               Kemal Bicakci},
  title     = {Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication
               Proxies using Trusted Computing},
  journal   = {CoRR},
  volume    = {abs/1511.05682},
  year      = {2015},
  url       = {http://arxiv.org/abs/1511.05682},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/UzunayB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/adhoc/UzunTBI14,
  author    = {Erkam Uzun and
               B{\"{u}}lent Tavli and
               Kemal Bicakci and
               Davut Incebacak},
  title     = {The impact of scalable routing on lifetime of smart grid communication
               networks},
  journal   = {Ad Hoc Networks},
  volume    = {22},
  pages     = {27--42},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.adhoc.2014.05.009},
  doi       = {10.1016/j.adhoc.2014.05.009},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/adhoc/UzunTBI14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tc/CotukBTU14,
  author    = {Huseyin Cotuk and
               Kemal Bicakci and
               B{\"{u}}lent Tavli and
               Erkam Uzun},
  title     = {The Impact of Transmission Power Control Strategies on Lifetime of
               Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Computers},
  volume    = {63},
  number    = {11},
  pages     = {2866--2879},
  year      = {2014},
  url       = {https://doi.org/10.1109/TC.2013.151},
  doi       = {10.1109/TC.2013.151},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tc/CotukBTU14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fnc/BicakciUAA14,
  author    = {Kemal Bicakci and
               Devrim Unal and
               Nadir Ascioglu and
               Oktay Adalier},
  title     = {Mobile Authentication Secure Against Man-In-The-Middle Attacks},
  booktitle = {The 9th International Conference on Future Networks and Communications
               (FNC'14) / The 11th International Conference on Mobile Systems and
               Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20,
               2014, Niagara Falls, Canada},
  pages     = {323--329},
  year      = {2014},
  crossref  = {DBLP:conf/fnc/2014},
  url       = {https://doi.org/10.1016/j.procs.2014.07.031},
  doi       = {10.1016/j.procs.2014.07.031},
  timestamp = {Thu, 14 Sep 2017 10:06:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fnc/BicakciUAA14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/mobilecloud/BicakciUAA14,
  author    = {Kemal Bicakci and
               Devrim Unal and
               Nadir Ascioglu and
               Oktay Adalier},
  title     = {Mobile Authentication Secure against Man-in-the-Middle Attacks},
  booktitle = {2nd {IEEE} International Conference on Mobile Cloud Computing, Services,
               and Engineering, MobileCloud 2014, Oxford, United Kingdom, April 8-11,
               2014},
  pages     = {273--276},
  year      = {2014},
  crossref  = {DBLP:conf/mobilecloud/2014},
  url       = {https://doi.org/10.1109/MobileCloud.2014.43},
  doi       = {10.1109/MobileCloud.2014.43},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobilecloud/BicakciUAA14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/passwords/BicakciS14,
  author    = {Kemal Bicakci and
               Tashtanbek Satiev},
  title     = {charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication},
  booktitle = {Technology and Practice of Passwords - International Conference on
               Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised
               Selected Papers},
  pages     = {74--86},
  year      = {2014},
  crossref  = {DBLP:conf/passwords/2014},
  url       = {https://doi.org/10.1007/978-3-319-24192-0_5},
  doi       = {10.1007/978-3-319-24192-0_5},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/passwords/BicakciS14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/CotukTBA14,
  author    = {Huseyin Cotuk and
               B{\"{u}}lent Tavli and
               Kemal Bicakci and
               Mehmet Burak Akgun},
  title     = {The impact of bandwidth constraints on the energy consumption of Wireless
               Sensor Networks},
  booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2014,
               Istanbul, Turkey, April 6-9, 2014},
  pages     = {2787--2792},
  year      = {2014},
  crossref  = {DBLP:conf/wcnc/2014},
  url       = {https://doi.org/10.1109/WCNC.2014.6952870},
  doi       = {10.1109/WCNC.2014.6952870},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wcnc/CotukTBA14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/BicakciBTP13,
  author    = {Kemal Bicakci and
               Ibrahim Ethem Bagci and
               B{\"{u}}lent Tavli and
               Zeydin Pala},
  title     = {Neighbor sensor networks: Increasing lifetime and eliminating partitioning
               through cooperation},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {35},
  number    = {4},
  pages     = {396--402},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.csi.2012.11.001},
  doi       = {10.1016/j.csi.2012.11.001},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/csi/BicakciBTP13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ejwcn/IncebacakTBA13,
  author    = {Davut Incebacak and
               B{\"{u}}lent Tavli and
               Kemal Bicakci and
               Ayseg{\"{u}}l Altin{-}Kayhan},
  title     = {Optimal number of routing paths in multi-path routing to minimize
               energy consumption in wireless sensor networks},
  journal   = {{EURASIP} J. Wireless Comm. and Networking},
  volume    = {2013},
  pages     = {252},
  year      = {2013},
  url       = {https://doi.org/10.1186/1687-1499-2013-252},
  doi       = {10.1186/1687-1499-2013-252},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ejwcn/IncebacakTBA13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toit/BicakciCO13,
  author    = {Kemal Bicakci and
               Bruno Crispo and
               Gabriele Oligeri},
  title     = {{LAKE:} {A} Server-Side Authenticated Key-Establishment with Low Computational
               Workload},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {13},
  number    = {2},
  pages     = {5:1--5:27},
  year      = {2013},
  url       = {http://doi.acm.org/10.1145/2542214.2542216},
  doi       = {10.1145/2542214.2542216},
  timestamp = {Tue, 03 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/toit/BicakciCO13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AkpulatBC13,
  author    = {Murat Akpulat and
               Kemal Bicakci and
               Ugur Cil},
  title     = {Revisiting graphical passwords for augmenting, not replacing, text
               passwords},
  booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New
               Orleans, LA, USA, December 9-13, 2013},
  pages     = {119--128},
  year      = {2013},
  crossref  = {DBLP:conf/acsac/2013},
  url       = {http://doi.acm.org/10.1145/2523649.2523672},
  doi       = {10.1145/2523649.2523672},
  timestamp = {Wed, 08 Jan 2014 20:55:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/AkpulatBC13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dcoss/SoylevBT13,
  author    = {Arda Soylev and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless
               Sensor Networks},
  booktitle = {{IEEE} International Conference on Distributed Computing in Sensor
               Systems, {DCOSS} 2013, Cambridge, MA, USA, May 20-23, 2013},
  pages     = {436--441},
  year      = {2013},
  crossref  = {DBLP:conf/dcoss/2013},
  url       = {https://doi.org/10.1109/DCOSS.2013.43},
  doi       = {10.1109/DCOSS.2013.43},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dcoss/SoylevBT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icc/BatmazTIB13,
  author    = {Anil Ufuk Batmaz and
               B{\"{u}}lent Tavli and
               Davut Incebacak and
               Kemal Bicakci},
  title     = {The impact of link unidirectionality and reverse path length on wireless
               sensor network lifetime},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages     = {1795--1799},
  year      = {2013},
  crossref  = {DBLP:conf/icc/2013},
  url       = {https://doi.org/10.1109/ICC.2013.6654780},
  doi       = {10.1109/ICC.2013.6654780},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icc/BatmazTIB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/milcom/PalaBT13,
  author    = {Zeydin Pala and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Mobility Helps Energy Balancing in Wireless Networks},
  booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
               Diego, CA, USA, November 18-20, 2013},
  pages     = {293--298},
  year      = {2013},
  crossref  = {DBLP:conf/milcom/2013},
  url       = {https://doi.org/10.1109/MILCOM.2013.58},
  doi       = {10.1109/MILCOM.2013.58},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/milcom/PalaBT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/siu/BatmazTIB13,
  author    = {Anil Ufuk Batmaz and
               B{\"{u}}lent Tavli and
               Davut Incebacak and
               Kemal Bicakci},
  title     = {Effects of handshake hop length of unidirectional links on the lifetime
               of wireless sensor networks},
  booktitle = {21st Signal Processing and Communications Applications Conference,
               {SIU} 2013, Haspolat, Turkey, April 24-26, 2013},
  pages     = {1--4},
  year      = {2013},
  crossref  = {DBLP:conf/siu/2013},
  url       = {https://doi.org/10.1109/SIU.2013.6531580},
  doi       = {10.1109/SIU.2013.6531580},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/siu/BatmazTIB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/siu/UzunAOKITB13,
  author    = {Erkam Uzun and
               Alper Aksa{\c{c}} and
               Orkun Ozturk and
               Hakan Ezgi Kiziloz and
               Davut Incebacak and
               B{\"{u}}lent Tavli and
               Kemal Bicakci},
  title     = {Network lifetime maximization and localized routing tradeoff in wireless
               sensor networks},
  booktitle = {21st Signal Processing and Communications Applications Conference,
               {SIU} 2013, Haspolat, Turkey, April 24-26, 2013},
  pages     = {1--4},
  year      = {2013},
  crossref  = {DBLP:conf/siu/2013},
  url       = {https://doi.org/10.1109/SIU.2013.6531201},
  doi       = {10.1109/SIU.2013.6531201},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/siu/UzunAOKITB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/compsec/UzunB12,
  author    = {Yasin Uzun and
               Kemal Bicakci},
  title     = {A second look at the performance of neural networks for keystroke
               dynamics using a publicly available dataset},
  journal   = {Computers {\&} Security},
  volume    = {31},
  number    = {5},
  pages     = {717--726},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.cose.2012.04.002},
  doi       = {10.1016/j.cose.2012.04.002},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/compsec/UzunB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/isci/BicakciBT12,
  author    = {Kemal Bicakci and
               Ibrahim Ethem Bagci and
               B{\"{u}}lent Tavli},
  title     = {Communication/computation tradeoffs for prolonging network lifetime
               in wireless sensor networks: The case of digital signatures},
  journal   = {Inf. Sci.},
  volume    = {188},
  pages     = {44--63},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.ins.2011.11.018},
  doi       = {10.1016/j.ins.2011.11.018},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/isci/BicakciBT12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/mta/TavliBZB12,
  author    = {B{\"{u}}lent Tavli and
               Kemal Bicakci and
               Ruken Zilan and
               Jos{\'{e}} M. Barcel{\'{o}}{-}Ordinas},
  title     = {A survey of visual sensor network platforms},
  journal   = {Multimedia Tools Appl.},
  volume    = {60},
  number    = {3},
  pages     = {689--726},
  year      = {2012},
  url       = {https://doi.org/10.1007/s11042-011-0840-z},
  doi       = {10.1007/s11042-011-0840-z},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/mta/TavliBZB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ntms/IncebacakBT12,
  author    = {Davut Incebacak and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks},
  booktitle = {5th International Conference on New Technologies, Mobility and Security,
               Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  pages     = {1--5},
  year      = {2012},
  crossref  = {DBLP:conf/ntms/2012},
  url       = {https://doi.org/10.1109/NTMS.2012.6208712},
  doi       = {10.1109/NTMS.2012.6208712},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ntms/IncebacakBT12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/BicakciGTB11,
  author    = {Kemal Bicakci and
               Hakan Gultekin and
               B{\"{u}}lent Tavli and
               Ibrahim Ethem Bagci},
  title     = {Maximizing lifetime of event-unobservable wireless sensor networks},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {33},
  number    = {4},
  pages     = {401--410},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.csi.2011.01.001},
  doi       = {10.1016/j.csi.2011.01.001},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/csi/BicakciGTB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/TavliAB11,
  author    = {B{\"{u}}lent Tavli and
               Mehmet Burak Akgun and
               Kemal Bicakci},
  title     = {Impact of Limiting Number of Links on the Lifetime of Wireless Sensor
               Networks},
  journal   = {{IEEE} Communications Letters},
  volume    = {15},
  number    = {1},
  pages     = {43--45},
  year      = {2011},
  url       = {https://doi.org/10.1109/LCOMM.2010.111910.101846},
  doi       = {10.1109/LCOMM.2010.111910.101846},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/icl/TavliAB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/BicakciBT11,
  author    = {Kemal Bicakci and
               Ibrahim Ethem Bagci and
               B{\"{u}}lent Tavli},
  title     = {Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink
               Unobservability},
  journal   = {{IEEE} Communications Letters},
  volume    = {15},
  number    = {2},
  pages     = {205--207},
  year      = {2011},
  url       = {https://doi.org/10.1109/LCOMM.2011.010311.101885},
  doi       = {10.1109/LCOMM.2011.010311.101885},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/icl/BicakciBT11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dim/BicakciAK11,
  author    = {Kemal Bicakci and
               Nart Bedin Atalay and
               Hakan Ezgi Kiziloz},
  title     = {Johnny in internet caf{\'{e}}: user study and exploration of
               password autocomplete in web browsers},
  booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  pages     = {33--42},
  year      = {2011},
  crossref  = {DBLP:conf/dim/2011},
  url       = {http://doi.acm.org/10.1145/2046642.2046652},
  doi       = {10.1145/2046642.2046652},
  timestamp = {Mon, 09 Dec 2013 15:50:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dim/BicakciAK11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/BicakciAYO11,
  author    = {Kemal Bicakci and
               Nart Bedin Atalay and
               Mustafa Yuceel and
               Paul C. van Oorschot},
  title     = {Exploration and Field Study of a Password Manager Using Icon-Based
               Passwords},
  booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
               and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
               Revised Selected Papers},
  pages     = {104--118},
  year      = {2011},
  crossref  = {DBLP:conf/fc/2011w},
  url       = {https://doi.org/10.1007/978-3-642-29889-9_9},
  doi       = {10.1007/978-3-642-29889-9_9},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/BicakciAYO11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nspw/BicakciO11,
  author    = {Kemal Bicakci and
               Paul C. van Oorschot},
  title     = {A multi-word password proposal (gridWord) and exploring questions
               about science in security research and usable security evaluation},
  booktitle = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
               USA, September 12-15, 2011},
  pages     = {25--36},
  year      = {2011},
  crossref  = {DBLP:conf/nspw/2011},
  url       = {http://doi.acm.org/10.1145/2073276.2073280},
  doi       = {10.1145/2073276.2073280},
  timestamp = {Tue, 13 Nov 2012 21:22:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nspw/BicakciO11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/adhoc/BicakciT10,
  author    = {Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Prolonging network lifetime with multi-domain cooperation strategies
               in wireless sensor networks},
  journal   = {Ad Hoc Networks},
  volume    = {8},
  number    = {6},
  pages     = {582--596},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.adhoc.2009.11.004},
  doi       = {10.1016/j.adhoc.2009.11.004},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/adhoc/BicakciT10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/TavliOB10,
  author    = {B{\"{u}}lent Tavli and
               M. Mikail Ozciloglu and
               Kemal Bicakci},
  title     = {Mitigation of Compromising Privacy by Transmission Range Control in
               Wireless Sensor Networks},
  journal   = {{IEEE} Communications Letters},
  volume    = {14},
  number    = {12},
  pages     = {1104--1106},
  year      = {2010},
  url       = {https://doi.org/10.1109/LCOMM.2010.101210.100731},
  doi       = {10.1109/LCOMM.2010.101210.100731},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/icl/TavliOB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/telsys/ZapataZBBT10,
  author    = {Manel Guerrero Zapata and
               Ruken Zilan and
               Jos{\'{e}} M. Barcel{\'{o}}{-}Ordinas and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {The future of security in Wireless Multimedia Sensor Networks - {A}
               position paper},
  journal   = {Telecommunication Systems},
  volume    = {45},
  number    = {1},
  pages     = {77--91},
  year      = {2010},
  url       = {https://doi.org/10.1007/s11235-009-9235-0},
  doi       = {10.1007/s11235-009-9235-0},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/telsys/ZapataZBBT10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/UnluB10,
  author    = {Seckin Anil Unlu and
               Kemal Bicakci},
  title     = {NoTabNab: Protection against the "tabnabbing attack"},
  booktitle = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
               18-20, 2010},
  pages     = {1--5},
  year      = {2010},
  crossref  = {DBLP:conf/ecrime/2010},
  url       = {https://doi.org/10.1109/ecrime.2010.5706695},
  doi       = {10.1109/ecrime.2010.5706695},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ecrime/UnluB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ems/IncebacakBT10,
  author    = {Davut Incebacak and
               Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Investigating the Tradeoffs between Spatial Granularity and Energy
               Requirements in Wireless Sensor Networks},
  booktitle = {Fourth UKSim European Symposium on Computer Modeling and Simulation,
               {EMS} 2010, Pisa, Italy, November 17-19, 2010},
  pages     = {414--419},
  year      = {2010},
  crossref  = {DBLP:conf/ems/2010},
  url       = {https://doi.org/10.1109/EMS.2010.75},
  doi       = {10.1109/EMS.2010.75},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ems/IncebacakBT10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/BicakciT09,
  author    = {Kemal Bicakci and
               B{\"{u}}lent Tavli},
  title     = {Denial-of-Service attacks and countermeasures in {IEEE} 802.11 wireless
               networks},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {31},
  number    = {5},
  pages     = {931--941},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.csi.2008.09.038},
  doi       = {10.1016/j.csi.2008.09.038},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/csi/BicakciT09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/icl/BicakciGT09,
  author    = {Kemal Bicakci and
               Hakan Gultekin and
               B{\"{u}}lent Tavli},
  title     = {The impact of one-time energy costs on network lifetime in wireless
               sensor networks},
  journal   = {{IEEE} Communications Letters},
  volume    = {13},
  number    = {12},
  pages     = {905--907},
  year      = {2009},
  url       = {https://doi.org/10.1109/LCOMM.2009.12.091331},
  doi       = {10.1109/LCOMM.2009.12.091331},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/icl/BicakciGT09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/compsac/BicakciAYGE09,
  author    = {Kemal Bicakci and
               Nart Bedin Atalay and
               Mustafa Yuceel and
               Hakan Gurbaslar and
               Burak Erdeniz},
  title     = {Towards Usable Solutions to Graphical Password Hotspot Problem},
  booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 2},
  pages     = {318--323},
  year      = {2009},
  crossref  = {DBLP:conf/compsac/2009-2},
  url       = {https://doi.org/10.1109/COMPSAC.2009.153},
  doi       = {10.1109/COMPSAC.2009.153},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/compsac/BicakciAYGE09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BicakciYEGA09,
  author    = {Kemal Bicakci and
               Mustafa Yuceel and
               Burak Erdeniz and
               Hakan Gurbaslar and
               Nart Bedin Atalay},
  title     = {Graphical Passwords as Browser Extension: Implementation and Usability
               Study},
  booktitle = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
               {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  pages     = {15--29},
  year      = {2009},
  crossref  = {DBLP:conf/ifiptm/2009},
  url       = {https://doi.org/10.1007/978-3-642-02056-8_2},
  doi       = {10.1007/978-3-642-02056-8_2},
  timestamp = {Wed, 24 May 2017 08:31:19 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ifiptm/BicakciYEGA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sin/Bicakci09,
  author    = {Kemal Bicakci},
  title     = {Pushing the limits of one-time signatures},
  booktitle = {Proceedings of the 2nd International Conference on Security of Information
               and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
               2009},
  pages     = {249--257},
  year      = {2009},
  crossref  = {DBLP:conf/sin/2009},
  url       = {http://doi.acm.org/10.1145/1626195.1626258},
  doi       = {10.1145/1626195.1626258},
  timestamp = {Fri, 22 Nov 2013 12:57:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sin/Bicakci09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soups/BicakciYEGA09,
  author    = {Kemal Bicakci and
               Mustafa Yuceel and
               Burak Erdeniz and
               Hakan Gurbaslar and
               Nart Bedin Atalay},
  title     = {Graphical passwords as browser extension: implementation and usability
               study},
  booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
               2009, Mountain View, California, USA, July 15-17, 2009},
  year      = {2009},
  crossref  = {DBLP:conf/soups/2009},
  url       = {http://doi.acm.org/10.1145/1572532.1572579},
  doi       = {10.1145/1572532.1572579},
  timestamp = {Tue, 28 Jul 2009 12:35:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soups/BicakciYEGA09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Bicakci08,
  author    = {Kemal Bicakci},
  title     = {Optimal Discretization for High-Entropy Graphical Passwords},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {178},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/178},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Bicakci08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/csi/Bicakci07,
  author    = {Kemal Bicakci},
  title     = {One-time proxy signatures revisited},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {29},
  number    = {4},
  pages     = {499--505},
  year      = {2007},
  url       = {https://doi.org/10.1016/j.csi.2006.12.001},
  doi       = {10.1016/j.csi.2006.12.001},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/csi/Bicakci07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iscc/GamageBCT06,
  author    = {Chandana Gamage and
               Kemal Bicakci and
               Bruno Crispo and
               Andrew S. Tanenbaum},
  title     = {Security for the Mythical Air-Dropped Sensor Network},
  booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
               {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages     = {41--47},
  year      = {2006},
  crossref  = {DBLP:conf/iscc/2006},
  url       = {https://doi.org/10.1109/ISCC.2006.143},
  doi       = {10.1109/ISCC.2006.143},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/GamageBCT06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BicakciCT06,
  author    = {Kemal Bicakci and
               Bruno Crispo and
               Andrew S. Tanenbaum},
  title     = {Reverse {SSL:} Improved Server Performance and DoS Resistance for
               {SSL} Handshakes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {212},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/212},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BicakciCT06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cn/BicakciB05,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {Improved server assisted signatures},
  journal   = {Computer Networks},
  volume    = {47},
  number    = {3},
  pages     = {351--366},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.comnet.2004.08.008},
  doi       = {10.1016/j.comnet.2004.08.008},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cn/BicakciB05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BicakciCT05,
  author    = {Kemal Bicakci and
               Bruno Crispo and
               Andrew S. Tanenbaum},
  title     = {Counting Abuses Using Flexible Off-line Credentials},
  booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
               2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  pages     = {548--559},
  year      = {2005},
  crossref  = {DBLP:conf/acisp/2005},
  url       = {https://doi.org/10.1007/11506157_46},
  doi       = {10.1007/11506157_46},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/BicakciCT05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icpads/UzunayB05,
  author    = {Yusuf Uzunay and
               Kemal Bicakci},
  title     = {{UNIDES:} An Efficient Real-Time System to Detect and Block Unauthorized
               Internet Access},
  booktitle = {11th International Conference on Parallel and Distributed Systems,
               {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  pages     = {245--249},
  year      = {2005},
  crossref  = {DBLP:conf/icpads/2005},
  url       = {https://doi.org/10.1109/ICPADS.2005.286},
  doi       = {10.1109/ICPADS.2005.286},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icpads/UzunayB05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sac/BicakciCT05,
  author    = {Kemal Bicakci and
               Bruno Crispo and
               Andrew S. Tanenbaum},
  title     = {How to incorporate revocation status information into the trust metrics
               for public-key certification},
  booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
               Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages     = {1594--1598},
  year      = {2005},
  crossref  = {DBLP:conf/sac/2005},
  url       = {http://doi.acm.org/10.1145/1066677.1067037},
  doi       = {10.1145/1066677.1067037},
  timestamp = {Tue, 03 Nov 2015 12:36:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sac/BicakciCT05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BicakciB04,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {Server Assisted Signatures Revisited},
  booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
               the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
               2004, Proceedings},
  pages     = {143--156},
  year      = {2004},
  crossref  = {DBLP:conf/ctrsa/2004},
  url       = {https://doi.org/10.1007/978-3-540-24660-2_12},
  doi       = {10.1007/978-3-540-24660-2_12},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/BicakciB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/europki/BicakciB04,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {A New Design of Privilege Management Infrastructure with Binding Signature
               Semantics},
  booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and
               Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
               Proceedings},
  pages     = {306--313},
  year      = {2004},
  crossref  = {DBLP:conf/europki/2004},
  url       = {https://doi.org/10.1007/978-3-540-25980-0_25},
  doi       = {10.1007/978-3-540-25980-0_25},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/europki/BicakciB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/medinfo/BicakciB04,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {{EVEREST:} An Efficient Method for Verification of Digital Signatures
               in Real-Time Teleradiology},
  booktitle = {{MEDINFO} 2004 - Proceedings of the 11th World Congress on Medical
               Informatics, San Francisco, California, USA, September 7-11, 2004},
  pages     = {1241--1245},
  year      = {2004},
  crossref  = {DBLP:conf/medinfo/2004},
  url       = {https://doi.org/10.3233/978-1-60750-949-3-1241},
  doi       = {10.3233/978-1-60750-949-3-1241},
  timestamp = {Fri, 26 May 2017 16:02:55 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/medinfo/BicakciB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cn/BicakciTT03,
  author    = {Kemal Bicakci and
               Gene Tsudik and
               Brian Tung},
  title     = {How to construct optimal one-time signatures},
  journal   = {Computer Networks},
  volume    = {43},
  number    = {3},
  pages     = {339--349},
  year      = {2003},
  url       = {https://doi.org/10.1016/S1389-1286(03)00285-8},
  doi       = {10.1016/S1389-1286(03)00285-8},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cn/BicakciTT03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/amia/BicakciB03,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {Survivable Authentication for Health Information Systems},
  booktitle = {{AMIA} 2003, American Medical Informatics Association Annual Symposium,
               Washington, DC, USA, November 8-12, 2003},
  year      = {2003},
  crossref  = {DBLP:conf/amia/2003},
  url       = {http://knowledge.amia.org/amia-55142-a2003a-1.616734/t-002-1.618748/f-001-1.618749/a-174-1.619569/a-175-1.619566},
  timestamp = {Mon, 04 Aug 2014 17:34:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/amia/BicakciB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iscc/BicakciB03,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {Design and Performance Evaluation of a Flexible and Efficient Server
               Assisted Signature Protocol},
  booktitle = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
               {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  pages     = {1239--1244},
  year      = {2003},
  crossref  = {DBLP:conf/iscc/2003},
  url       = {https://doi.org/10.1109/ISCC.2003.1214284},
  doi       = {10.1109/ISCC.2003.1214284},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/BicakciB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/iscis/BicakciB03,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {One-Time Passwords: Security Analysis Using {BAN} Logic and Integrating
               with Smartcard Authentication},
  booktitle = {Computer and Information Sciences - {ISCIS} 2003, 18th International
               Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings},
  pages     = {794--801},
  year      = {2003},
  crossref  = {DBLP:conf/iscis/2003},
  url       = {https://doi.org/10.1007/978-3-540-39737-3_99},
  doi       = {10.1007/978-3-540-39737-3_99},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscis/BicakciB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/spc/BicakciB03,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {{SAOTS:} {A} New Efficient Server Assisted Signature Scheme for Pervasive
               Computing},
  booktitle = {Security in Pervasive Computing, First International Conference, Boppard,
               Germany, March 12-14, 2003, Revised Papers},
  pages     = {187--200},
  year      = {2003},
  crossref  = {DBLP:conf/spc/2003},
  url       = {https://doi.org/10.1007/978-3-540-39881-3_17},
  doi       = {10.1007/978-3-540-39881-3_17},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spc/BicakciB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wetice/BicakciB02,
  author    = {Kemal Bicakci and
               Nazife Baykal},
  title     = {Infinite Length Hash Chains and Their Applications},
  booktitle = {11th {IEEE} International Workshops on Enabling Technologies: Infrastructure
               for Collaborative Enterprises {(WETICE} 2002), 10-12 June 2002, Pittsburgh,
               PA, {USA}},
  pages     = {57--61},
  year      = {2002},
  crossref  = {DBLP:conf/wetice/2002},
  url       = {https://doi.org/10.1109/ENABL.2002.1029989},
  doi       = {10.1109/ENABL.2002.1029989},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wetice/BicakciB02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cns/2016,
  title     = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
               2016, Philadelphia, PA, USA, October 17-19, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7854080},
  isbn      = {978-1-5090-3065-1},
  timestamp = {Fri, 03 Mar 2017 14:28:48 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cns/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iscc/2015,
  title     = {2015 {IEEE} Symposium on Computers and Communication, {ISCC} 2015,
               Larnaca, Cyprus, July 6-9, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7397314},
  isbn      = {978-1-4673-7194-0},
  timestamp = {Fri, 06 May 2016 08:58:23 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fnc/2014,
  title     = {The 9th International Conference on Future Networks and Communications
               (FNC'14) / The 11th International Conference on Mobile Systems and
               Pervasive Computing (MobiSPC'14) / Affiliated Workshops, August 17-20,
               2014, Niagara Falls, Canada},
  series    = {Procedia Computer Science},
  volume    = {34},
  publisher = {Elsevier},
  year      = {2014},
  url       = {http://www.sciencedirect.com/science/journal/18770509/34/},
  timestamp = {Thu, 14 Sep 2017 10:06:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fnc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/mobilecloud/2014,
  title     = {2nd {IEEE} International Conference on Mobile Cloud Computing, Services,
               and Engineering, MobileCloud 2014, Oxford, United Kingdom, April 8-11,
               2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6823824},
  isbn      = {978-1-4799-2504-9},
  timestamp = {Fri, 27 May 2016 13:59:19 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobilecloud/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/passwords/2014,
  editor    = {Stig Fr. Mj{\o}lsnes},
  title     = {Technology and Practice of Passwords - International Conference on
               Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9393},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24192-0},
  doi       = {10.1007/978-3-319-24192-0},
  isbn      = {978-3-319-24191-3},
  timestamp = {Thu, 25 May 2017 00:39:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/passwords/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2014,
  title     = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2014,
               Istanbul, Turkey, April 6-9, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6923023},
  isbn      = {978-1-4799-3083-8},
  timestamp = {Tue, 02 Dec 2014 18:43:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wcnc/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2013,
  editor    = {Charles N. Payne Jr.},
  title     = {Annual Computer Security Applications Conference, {ACSAC} '13, New
               Orleans, LA, USA, December 9-13, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2523649},
  isbn      = {978-1-4503-2015-3},
  timestamp = {Wed, 08 Jan 2014 20:55:25 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dcoss/2013,
  title     = {{IEEE} International Conference on Distributed Computing in Sensor
               Systems, {DCOSS} 2013, Cambridge, MA, USA, May 20-23, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6568403},
  isbn      = {978-1-4799-0206-4},
  timestamp = {Tue, 23 Jun 2015 17:24:11 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dcoss/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icc/2013,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6637584},
  timestamp = {Tue, 12 Nov 2013 16:06:29 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/milcom/2013,
  editor    = {Joe Senftle and
               Mike Beltrani and
               Kari Karwedsky},
  title     = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
               Diego, CA, USA, November 18-20, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6717175},
  timestamp = {Wed, 30 Nov 2016 21:26:22 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/milcom/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/siu/2013,
  title     = {21st Signal Processing and Communications Applications Conference,
               {SIU} 2013, Haspolat, Turkey, April 24-26, 2013},
  publisher = {{IEEE}},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6521474},
  isbn      = {978-1-4673-5562-9},
  timestamp = {Sat, 07 Feb 2015 18:08:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/siu/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ntms/2012,
  editor    = {Albert Levi and
               Mohamad Badra and
               Matteo Cesana and
               Mona Ghassemian and
               {\"{O}}zg{\"{u}}r G{\"{u}}rb{\"{u}}z and
               Nafa{\^{a}} Jabeur and
               Marek Klonowski and
               Antonio Ma{\~{n}}a and
               Susana Sargento and
               Sherali Zeadally},
  title     = {5th International Conference on New Technologies, Mobility and Security,
               Istanbul, Turkey, {NTMS} 2012, May 7-10, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6203453},
  isbn      = {978-1-4673-0229-6},
  timestamp = {Wed, 16 Jan 2013 14:53:01 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ntms/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dim/2011,
  editor    = {Abhilasha Bhargav{-}Spantzel and
               Thomas Gro{\ss}},
  title     = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046642},
  isbn      = {978-1-4503-1006-2},
  timestamp = {Mon, 09 Dec 2013 15:50:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dim/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2011w,
  editor    = {George Danezis and
               Sven Dietrich and
               Kazue Sako},
  title     = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
               and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7126},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29889-9},
  doi       = {10.1007/978-3-642-29889-9},
  isbn      = {978-3-642-29888-2},
  timestamp = {Fri, 26 May 2017 00:50:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2011w},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nspw/2011,
  editor    = {Sean Peisert and
               Richard Ford and
               Carrie Gates and
               Cormac Herley},
  title     = {2011 New Security Paradigms Workshop, {NSPW} '11, Marin County, CA,
               USA, September 12-15, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2073276},
  isbn      = {978-1-4503-1078-9},
  timestamp = {Tue, 13 Nov 2012 21:22:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nspw/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ecrime/2010,
  title     = {2010 eCrime Researchers Summit, eCrime 2010, Dallas, TX, USA, October
               18-20, 2010},
  publisher = {{IEEE}},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5702590},
  isbn      = {978-1-4244-7760-9},
  timestamp = {Tue, 14 Jun 2016 15:33:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ecrime/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ems/2010,
  title     = {Fourth UKSim European Symposium on Computer Modeling and Simulation,
               {EMS} 2010, Pisa, Italy, November 17-19, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5703186},
  isbn      = {978-0-7695-4308-6},
  timestamp = {Thu, 24 Jul 2014 17:34:13 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ems/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/compsac/2009-2,
  editor    = {Sheikh Iqbal Ahamed and
               Elisa Bertino and
               Carl K. Chang and
               Vladimir Getov and
               Lin Liu and
               Hua Ming and
               Rajesh Subramanyan},
  title     = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 2},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5254045},
  timestamp = {Mon, 15 Jun 2015 19:00:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/compsac/2009-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ifiptm/2009,
  editor    = {Elena Ferrari and
               Ninghui Li and
               Elisa Bertino and
               Y{\"{u}}cel Karabulut},
  title     = {Trust Management III, Third {IFIP} {WG} 11.11 International Conference,
               {IFIPTM} 2009 , West Lafayette, IN, USA, June 15-19, 2009. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {300},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02056-8},
  doi       = {10.1007/978-3-642-02056-8},
  isbn      = {978-3-642-02055-1},
  timestamp = {Wed, 24 May 2017 08:31:19 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ifiptm/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sin/2009,
  editor    = {Atilla El{\c{c}}i and
               Oleg B. Makarevich and
               Mehmet A. Orgun and
               Alexander G. Chefranov and
               Josef Pieprzyk and
               Yuri Anatolievich Bryukhomitsky and
               Siddika Berna {\"{O}}rs},
  title     = {Proceedings of the 2nd International Conference on Security of Information
               and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
               2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-412-6},
  timestamp = {Fri, 22 Nov 2013 12:57:23 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sin/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soups/2009,
  editor    = {Lorrie Faith Cranor},
  title     = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
               2009, Mountain View, California, USA, July 15-17, 2009},
  series    = {{ACM} International Conference Proceeding Series},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-736-3},
  timestamp = {Tue, 28 Jul 2009 12:35:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soups/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iscc/2006,
  editor    = {Paolo Bellavista and
               Chi{-}Ming Chen and
               Antonio Corradi and
               Mahmoud Daneshmand},
  title     = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
               {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=11130},
  isbn      = {0-7695-2588-1},
  timestamp = {Fri, 19 Feb 2016 12:15:14 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/2005,
  editor    = {Colin Boyd and
               Juan Manuel Gonz{\'{a}}lez Nieto},
  title     = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
               2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3574},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b137750},
  doi       = {10.1007/b137750},
  isbn      = {3-540-26547-3},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icpads/2005,
  title     = {11th International Conference on Parallel and Distributed Systems,
               {ICPADS} 2005, Fuduoka, Japan, July 20-22, 2005},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10248},
  isbn      = {0-7695-2281-5},
  timestamp = {Mon, 04 May 2015 17:00:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/icpads/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sac/2005,
  editor    = {Hisham Haddad and
               Lorie M. Liebrock and
               Andrea Omicini and
               Roger L. Wainwright},
  title     = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
               Santa Fe, New Mexico, USA, March 13-17, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {http://doi.acm.org/10.1145/1066677},
  doi       = {10.1145/1066677},
  isbn      = {1-58113-964-0},
  timestamp = {Tue, 03 Nov 2015 12:36:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sac/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2004,
  editor    = {Tatsuaki Okamoto},
  title     = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
               the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2964},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95630},
  doi       = {10.1007/b95630},
  isbn      = {3-540-20996-4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/europki/2004,
  editor    = {Sokratis K. Katsikas and
               Stefanos Gritzalis and
               Javier Lopez},
  title     = {Public Key Infrastructure, First European PKIWorkshop: Research and
               Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3093},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98201},
  doi       = {10.1007/b98201},
  isbn      = {3-540-22216-2},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/europki/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/medinfo/2004,
  editor    = {Marius Fieschi and
               Enrico W. Coiera and
               Jack Yu{-}Chan Li},
  title     = {{MEDINFO} 2004 - Proceedings of the 11th World Congress on Medical
               Informatics, San Francisco, California, USA, September 7-11, 2004},
  series    = {Studies in Health Technology and Informatics},
  volume    = {107},
  publisher = {{IOS} Press},
  year      = {2004},
  url       = {http://ebooks.iospress.nl/volume/medinfo-2004},
  isbn      = {978-1-58603-444-3},
  timestamp = {Fri, 26 May 2017 16:02:55 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/medinfo/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/amia/2003,
  title     = {{AMIA} 2003, American Medical Informatics Association Annual Symposium,
               Washington, DC, USA, November 8-12, 2003},
  publisher = {{AMIA}},
  year      = {2003},
  url       = {http://knowledge.amia.org/amia-55142-a2003a-1.616734},
  timestamp = {Mon, 04 Aug 2014 17:34:14 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/amia/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iscc/2003,
  title     = {Proceedings of the Eighth {IEEE} Symposium on Computers and Communications
               {(ISCC} 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey},
  publisher = {{IEEE} Computer Society},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8616},
  isbn      = {0-7695-1961-X},
  timestamp = {Fri, 19 Feb 2016 12:13:40 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscc/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/iscis/2003,
  editor    = {Adnan Yazici and
               Cevat Sener},
  title     = {Computer and Information Sciences - {ISCIS} 2003, 18th International
               Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2869},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b14229},
  doi       = {10.1007/b14229},
  isbn      = {3-540-20409-1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/iscis/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/spc/2003,
  editor    = {Dieter Hutter and
               G{\"{u}}nter M{\"{u}}ller and
               Werner Stephan and
               Markus Ullmann},
  title     = {Security in Pervasive Computing, First International Conference, Boppard,
               Germany, March 12-14, 2003, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2802},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b95124},
  doi       = {10.1007/b95124},
  isbn      = {3-540-20887-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/spc/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wetice/2002,
  title     = {11th {IEEE} International Workshops on Enabling Technologies: Infrastructure
               for Collaborative Enterprises {(WETICE} 2002), 10-12 June 2002, Pittsburgh,
               PA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8006},
  isbn      = {0-7695-1748-X},
  timestamp = {Thu, 06 Aug 2015 09:24:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wetice/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier