BibTeX records: M. Ufuk Çaglayan

download as .bib file

@inproceedings{DBLP:conf/6gnet/BulbulEBCA22,
  author       = {Nurefsan Sertbas B{\"{u}}lb{\"{u}}l and
                  Orhan Ermis and
                  Serif Bahtiyar and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {Trust Enhanced Security for Routing in {SDN}},
  booktitle    = {1st International Conference on 6G Networking, 6GNet 2022, Paris,
                  France, July 6-8, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/6GNet54646.2022.9830213},
  doi          = {10.1109/6GNET54646.2022.9830213},
  timestamp    = {Tue, 28 Nov 2023 14:51:11 +0100},
  biburl       = {https://dblp.org/rec/conf/6gnet/BulbulEBCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/Caglayan20,
  author       = {M. Ufuk {\c{C}}aglayan},
  editor       = {Maria Carla Calzarossa and
                  Erol Gelenbe and
                  Krzysztof Grochla and
                  Ricardo Lent and
                  Tadeusz Czach{\'{o}}rski},
  title        = {Performance, Energy Savings and Security: An Introduction},
  booktitle    = {Modelling, Analysis, and Simulation of Computer and Telecommunication
                  Systems - 28th International Symposium, {MASCOTS} 2020, Nice, France,
                  November 17-19, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12527},
  pages        = {3--28},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68110-4\_1},
  doi          = {10.1007/978-3-030-68110-4\_1},
  timestamp    = {Mon, 03 Jan 2022 22:35:54 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/Caglayan20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CantaliECE19,
  author       = {Gokcan Cantali and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan and
                  Cem Ersoy},
  title        = {Analytical Models for the Scalability of Dynamic Group-key Agreement
                  Protocols and Secure File Sharing Systems},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {22},
  number       = {4},
  pages        = {20:1--20:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3342998},
  doi          = {10.1145/3342998},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CantaliECE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/AytacECA18,
  author       = {Samet Ayta{\c{c}} and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  editor       = {Akka Zemmari and
                  Mohamed Mosbah and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {Authenticated Quality of Service Aware Routing in Software Defined
                  Networks},
  booktitle    = {Risks and Security of Internet and Systems - 13th International Conference,
                  CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11391},
  pages        = {110--127},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12143-3\_10},
  doi          = {10.1007/978-3-030-12143-3\_10},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/AytacECA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocybersec/Caglayan18,
  author       = {Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Erol Gelenbe and
                  Paolo Campegiani and
                  Tadeusz Czach{\'{o}}rski and
                  Sokratis K. Katsikas and
                  Ioannis Komnios and
                  Luigi Romano and
                  Dimitrios Tzovaras},
  title        = {Some Current Cybersecurity Research in Europe},
  booktitle    = {Security in Computer and Information Sciences - First International
                  {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February
                  26-27, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {821},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95189-8\_1},
  doi          = {10.1007/978-3-319-95189-8\_1},
  timestamp    = {Fri, 31 Jan 2020 21:32:25 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocybersec/Caglayan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ErmisBAC17,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {A secure and efficient group key agreement approach for mobile ad
                  hoc networks},
  journal      = {Ad Hoc Networks},
  volume       = {67},
  pages        = {24--39},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.adhoc.2017.10.003},
  doi          = {10.1016/J.ADHOC.2017.10.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ErmisBAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ErmisBAC17,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {A key agreement protocol with partial backward confidentiality},
  journal      = {Comput. Networks},
  volume       = {129},
  pages        = {159--177},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.09.008},
  doi          = {10.1016/J.COMNET.2017.09.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ErmisBAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/es/KulturC17,
  author       = {Yigit Kultur and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Hybrid approaches for detecting credit card fraud},
  journal      = {Expert Syst. J. Knowl. Eng.},
  volume       = {34},
  number       = {2},
  year         = {2017},
  url          = {https://doi.org/10.1111/exsy.12191},
  doi          = {10.1111/EXSY.12191},
  timestamp    = {Tue, 26 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/es/KulturC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ErmisBAC17,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {A Comparative Study on the Scalability of Dynamic Group Key Agreement
                  Protocols},
  booktitle    = {Proceedings of the 12th International Conference on Availability,
                  Reliability and Security, Reggio Calabria, Italy, August 29 - September
                  01, 2017},
  pages        = {62:1--62:6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3098954.3104048},
  doi          = {10.1145/3098954.3104048},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ErmisBAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/BahtiyarEC17,
  author       = {Serif Bahtiyar and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Muhammad Younas and
                  Markus Aleksy and
                  Jamal Bentahar},
  title        = {A Framework for Trust Assessment of Security Systems on Flexible Networks},
  booktitle    = {5th {IEEE} International Conference on Future Internet of Things and
                  Cloud, FiCloud 2017, Prague, Czech Republic, August 21-23, 2017},
  pages        = {177--182},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FiCloud.2017.23},
  doi          = {10.1109/FICLOUD.2017.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/BahtiyarEC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/AkgunC16,
  author       = {Mete Akg{\"{u}}n and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Towards Scalable Identification in {RFID} Systems},
  journal      = {Wirel. Pers. Commun.},
  volume       = {86},
  number       = {2},
  pages        = {403--421},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11277-015-2936-7},
  doi          = {10.1007/S11277-015-2936-7},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/AkgunC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiwis/BahtiyarEC16,
  author       = {Serif Bahtiyar and
                  Orhan Ermis and
                  Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Natalia Kryvinska and
                  Christine Strauss and
                  Do Van Thanh},
  title        = {Adaptive Trust Scenarios for Mobile Security},
  booktitle    = {Mobile Web and Intelligent Information Systems - 13th International
                  Conference, MobiWIS 2016, Vienna, Austria, August 22-24, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9847},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44215-0\_11},
  doi          = {10.1007/978-3-319-44215-0\_11},
  timestamp    = {Sun, 02 Jun 2019 21:19:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiwis/BahtiyarEC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AkgunC15,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Providing destructive privacy and scalability in {RFID} systems using
                  PUFs},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {32--42},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.02.001},
  doi          = {10.1016/J.ADHOC.2015.02.001},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AkgunC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ErmisBAC15,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {An improved conference-key agreement protocol for dynamic groups with
                  efficient fault correction},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {7},
  pages        = {1347--1359},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1089},
  doi          = {10.1002/SEC.1089},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ErmisBAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DeveciC15,
  author       = {Engin Deveci and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Model driven security framework for software design and verification},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2768--2792},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1200},
  doi          = {10.1002/SEC.1200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DeveciC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AkgunBC15,
  author       = {Mete Akg{\"{u}}n and
                  Ali Osman Bayrak and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Attacks and improvements to chaotic map-based {RFID} authentication
                  protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4028--4040},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1319},
  doi          = {10.1002/SEC.1319},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AkgunBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/CantaliEGAC15,
  author       = {Gokcan Cantali and
                  Orhan Ermis and
                  G{\"{u}}rkan G{\"{u}}r and
                  Fatih Alag{\"{o}}z and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Lightweight context-aware security system for wireless Internet access},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {765--766},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346925},
  doi          = {10.1109/CNS.2015.7346925},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/CantaliEGAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/Caglayan15,
  author       = {Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Omer H. Abdelrahman and
                  Erol Gelenbe and
                  G{\"{o}}k{\c{c}}e G{\"{o}}rbil and
                  Ricardo Lent},
  title        = {{ISCIS} and Erol Gelenbe's Contributions},
  booktitle    = {Information Sciences and Systems 2015 - 30th International Symposium
                  on Computer and Information Sciences, {ISCIS} 2015, London, UK, 21-24
                  September 2015},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {363},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22635-4\_1},
  doi          = {10.1007/978-3-319-22635-4\_1},
  timestamp    = {Sat, 16 Sep 2017 12:11:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iscis/Caglayan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/AkgunC15,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Weaknesses of two {RFID} protocols regarding de-synchronization attacks},
  booktitle    = {International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2015, Dubrovnik, Croatia, August 24-28, 2015},
  pages        = {828--833},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IWCMC.2015.7289190},
  doi          = {10.1109/IWCMC.2015.7289190},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/AkgunC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/BahtiyarC14,
  author       = {Serif Bahtiyar and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Trust assessment of security for e-health systems},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {13},
  number       = {3},
  pages        = {164--177},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.elerap.2013.10.003},
  doi          = {10.1016/J.ELERAP.2013.10.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/BahtiyarC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/AkgunUC14,
  author       = {Mete Akg{\"{u}}n and
                  Tubitak Uekae and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Vulnerabilities of {RFID} Security Protocol Based on Chaotic Maps},
  booktitle    = {22nd {IEEE} International Conference on Network Protocols, {ICNP}
                  2014, Raleigh, NC, USA, October 21-24, 2014},
  pages        = {648--653},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICNP.2014.103},
  doi          = {10.1109/ICNP.2014.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/AkgunUC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/UnalC13,
  author       = {Devrim Unal and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {A formal role-based access control model for security policies in
                  multi-domain mobile networks},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {1},
  pages        = {330--350},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.09.018},
  doi          = {10.1016/J.COMNET.2012.09.018},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/UnalC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/BahtiyarC13,
  author       = {Serif Bahtiyar and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Security similarity based trust in cyber space},
  journal      = {Knowl. Based Syst.},
  volume       = {52},
  pages        = {290--301},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.knosys.2013.08.012},
  doi          = {10.1016/J.KNOSYS.2013.08.012},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/BahtiyarC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UnalC13,
  author       = {Devrim Unal and
                  M. Ufuk {\c{C}}aglayan},
  title        = {{XFPM-RBAC:} XML-based specification language for security policies
                  in multidomain mobile networks},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {12},
  pages        = {1420--1444},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.411},
  doi          = {10.1002/SEC.411},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/UnalC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/ErmisBAC13,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Open problems for group-key agreement protocols on Vehicular Ad-hoc
                  Networks},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012,
                  Las Vegas, NV, USA, December 2-6, 2013},
  pages        = {828--831},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCVE.2013.6799908},
  doi          = {10.1109/ICCVE.2013.6799908},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccve/ErmisBAC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ErmisBAC13,
  author       = {Orhan Ermis and
                  Serif Bahtiyar and
                  Emin Anarim and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Oleg B. Makarevich},
  title        = {An improved fault-tolerant conference-key agreement protocol with
                  forward secrecy},
  booktitle    = {The 6th International Conference on Security of Information and Networks,
                  {SIN} '13, Aksaray, Turkey, November 26-28, 2013},
  pages        = {306--310},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523514.2527008},
  doi          = {10.1145/2523514.2527008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ErmisBAC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkgunC13a,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Weaknesses in a Recently Proposed {RFID} Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {855},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/855},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkgunC13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijahuc/OnemGC12,
  author       = {E. Onem and
                  A. Burak G{\"{u}}rdag and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Formal security analysis of Ariadne secure routing protocol using
                  model checking},
  journal      = {Int. J. Ad Hoc Ubiquitous Comput.},
  volume       = {9},
  number       = {1},
  pages        = {12--24},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJAHUC.2012.045537},
  doi          = {10.1504/IJAHUC.2012.045537},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijahuc/OnemGC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BahtiyarC12,
  author       = {Serif Bahtiyar and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Extracting trust information from security system of a service},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {1},
  pages        = {480--490},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.10.002},
  doi          = {10.1016/J.JNCA.2011.10.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/BahtiyarC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AkgunC11,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan},
  title        = {{PUF} Based Scalable Private {RFID} Authentication},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {473--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.73},
  doi          = {10.1109/ARES.2011.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AkgunC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/BahtiyarCC10,
  author       = {Serif Bahtiyar and
                  Murat Cihan and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {A Model of Security Information Flow on Entities for Trust Computation},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {803--808},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.153},
  doi          = {10.1109/CIT.2010.153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/BahtiyarCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkgunGC10,
  author       = {Mete Akg{\"{u}}n and
                  Ali {\"{O}}zhan G{\"{u}}rel and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Attacks to a lightweight {RFID} mutual authentication protocol},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678039/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkgunGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/UnalAC10,
  author       = {Devrim Unal and
                  Ozan Akar and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Model Checking of Location and Mobility Related Security Policy Specifications
                  in Ambient Calculus},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_12},
  doi          = {10.1007/978-3-642-14706-7\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/UnalAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AkgunC10,
  author       = {Mete Akg{\"{u}}n and
                  Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {Extending an {RFID} Security and Privacy Model by Considering Forward
                  Untraceability},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_16},
  doi          = {10.1007/978-3-642-22444-7\_16},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AkgunC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AkgunCA09,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan and
                  Emin Anarim},
  title        = {Secure {RFID} Authentication with Efficient Key-Lookup},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425303},
  doi          = {10.1109/GLOCOM.2009.5425303},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/AkgunCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/AkgunCA09,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan and
                  Emin Anarim},
  title        = {A new {RFID} authentication protocol with resistance to server impersonation},
  booktitle    = {23rd {IEEE} International Symposium on Parallel and Distributed Processing,
                  {IPDPS} 2009, Rome, Italy, May 23-29, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IPDPS.2009.5161243},
  doi          = {10.1109/IPDPS.2009.5161243},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/AkgunCA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BahtiyarCC09,
  author       = {Serif Bahtiyar and
                  Murat Cihan and
                  Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Mehmet A. Orgun and
                  Alexander G. Chefranov and
                  Josef Pieprzyk and
                  Yuri Anatolievich Bryukhomitsky and
                  Siddika Berna {\"{O}}rs},
  title        = {An architectural approach for assessing system trust based on security
                  policy specifications and security mechanisms},
  booktitle    = {Proceedings of the 2nd International Conference on Security of Information
                  and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
                  2009},
  pages        = {71--74},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1626195.1626214},
  doi          = {10.1145/1626195.1626214},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/BahtiyarCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/TschaC06,
  author       = {Yeonghwan Tscha and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Query slipping prevention for trajectory-based publishing and subscribing
                  in wireless sensor networks},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {11},
  pages        = {1979--1991},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2005.12.010},
  doi          = {10.1016/J.COMCOM.2005.12.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/TschaC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscn/IsciAC06,
  author       = {Dilek Demirel Isci and
                  Fatih Alag{\"{o}}z and
                  M. Ufuk {\c{C}}aglayan},
  title        = {{IPSEC} over satellite links: a new flow identification method},
  booktitle    = {Proceedings of the International Symposium on Computer Networks, {ISCN}
                  2006, June 16-18, 2006, Istanbul, Turkey},
  pages        = {140--145},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCN.2006.1662523},
  doi          = {10.1109/ISCN.2006.1662523},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscn/IsciAC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscn/UnalC06,
  author       = {Devrim Unal and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Theorem proving for modeling and conflict checking of authorization
                  policies},
  booktitle    = {Proceedings of the International Symposium on Computer Networks, {ISCN}
                  2006, June 16-18, 2006, Istanbul, Turkey},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCN.2006.1662524},
  doi          = {10.1109/ISCN.2006.1662524},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscn/UnalC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ParkTLC05,
  author       = {Junseok Park and
                  Yeonghwan Tscha and
                  Kyoon Ha Lee and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Query slipping prevention for trajectory-based matchmaking service
                  in wireless sensor networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2005, Seoul, Korea, 16-20 May 2005},
  pages        = {3050--3056},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICC.2005.1494955},
  doi          = {10.1109/ICC.2005.1494955},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ParkTLC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/CalikliC05,
  author       = {Handan G{\"{u}}l {\c{C}}alikli and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {A Formal Policy Specification Language for an 802.11 {WLAN} with Enhanced
                  Security Network},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {183--192},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_21},
  doi          = {10.1007/11569596\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/CalikliC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/Caglayan05,
  author       = {M. Ufuk {\c{C}}aglayan},
  editor       = {Pinar Yolum and
                  Tunga G{\"{u}}ng{\"{o}}r and
                  Fikret S. G{\"{u}}rgen and
                  Can C. {\"{O}}zturan},
  title        = {Erol Gelenbe's Career and Contributions},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2005, 20th International
                  Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3733},
  pages        = {966--970},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11569596\_98},
  doi          = {10.1007/11569596\_98},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/Caglayan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/others/05/TurgutC05,
  author       = {B. Turgut and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Tuna Tugcu and
                  Erol Gelenbe and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {An {AAA} based solution for the Secure Interoperability of 3G and
                  802.11 Networks},
  booktitle    = {New Trends in Computer Networks},
  series       = {Advances in Computer Science and Engineering : Reports and Monographs},
  volume       = {1},
  publisher    = {Imperial College Press},
  year         = {2005},
  url          = {https://doi.org/10.1142/9781860947308\_0036},
  doi          = {10.1142/9781860947308\_0036},
  timestamp    = {Mon, 22 Jun 2020 14:58:58 +0200},
  biburl       = {https://dblp.org/rec/books/others/05/TurgutC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/others/05/TGCA2005,
  editor       = {Tuna Tugcu and
                  Erol Gelenbe and
                  M. Ufuk {\c{C}}aglayan and
                  Fatih Alag{\"{o}}z},
  title        = {New Trends in Computer Networks},
  series       = {Advances in Computer Science and Engineering : Reports and Monographs},
  volume       = {1},
  publisher    = {Imperial College Press},
  year         = {2005},
  url          = {https://doi.org/10.1142/p415},
  doi          = {10.1142/P415},
  isbn         = {978-1-86094-611-0},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/others/05/TGCA2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/LeviCK04,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan and
                  {\c{C}}etin Kaya Ko{\c{c}}},
  title        = {Use of nested certificates for efficient, dynamic, and trust preserving
                  public key infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {21--59},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984336},
  doi          = {10.1145/984334.984336},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/LeviCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/DemirkolECD04,
  author       = {Ilker Demirkol and
                  Cem Ersoy and
                  Mehmet Ufuk {\c{C}}aglayan and
                  Hakan Deli{\c{c}}},
  title        = {Location area planning and cell-to-switch assignment in cellular networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {3},
  number       = {3},
  pages        = {880--890},
  year         = {2004},
  url          = {https://doi.org/10.1109/TWC.2004.827767},
  doi          = {10.1109/TWC.2004.827767},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/DemirkolECD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscis/LeviCAKC04,
  author       = {Albert Levi and
                  Erhan {\c{C}}etintas and
                  Murat Aydos and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  M. Ufuk {\c{C}}aglayan},
  editor       = {Cevdet Aykanat and
                  Tugrul Dayar and
                  Ibrahim Korpeoglu},
  title        = {Relay Attacks on Bluetooth Authentication and Solutions},
  booktitle    = {Computer and Information Sciences - {ISCIS} 2004, 19th International
                  Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3280},
  pages        = {278--288},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30182-0\_29},
  doi          = {10.1007/978-3-540-30182-0\_29},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscis/LeviCAKC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/TezcanCC04,
  author       = {Nurcan Tezcan and
                  Erdal Cayirci and
                  M. Ufuk {\c{C}}aglayan},
  title        = {End-to-end reliable event transfer in wireless sensor networks},
  booktitle    = {Proceedings of the {IEEE} 15th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2004, 5-8 September
                  2004, Barcelona, Spain},
  pages        = {989--994},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/PIMRC.2004.1373847},
  doi          = {10.1109/PIMRC.2004.1373847},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/TezcanCC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OnurDEC02,
  author       = {Ertan Onur and
                  Hakan Deli{\c{c}} and
                  Cem Ersoy and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Measurement-based replanning of cell capacities in {GSM} networks},
  journal      = {Comput. Networks},
  volume       = {39},
  number       = {6},
  pages        = {749--767},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1389-1286(02)00230-X},
  doi          = {10.1016/S1389-1286(02)00230-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/OnurDEC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/OnurDEC02,
  author       = {Ertan Onur and
                  Hakan Deli{\c{c}} and
                  Cem Ersoy and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Measurement-based replanning of {GSM} cell capacities considering
                  retrials, redials and hand-offs},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2002, April
                  28 - May 2, 2002, New York City, NY, {USA}},
  pages        = {3361--3365},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICC.2002.997454},
  doi          = {10.1109/ICC.2002.997454},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/OnurDEC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/DemirkolECD01,
  author       = {Ilker Demirkol and
                  Cem Ersoy and
                  M. Ufuk {\c{C}}aglayan and
                  Hakan Deli{\c{c}}},
  title        = {Location Area Planning in Cellular Networks Using Simulated Annealing},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
                  Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Twenty years into the communications odyssey, Anchorage,
                  Alaska, USA, April 22-26, 2001},
  pages        = {13--20},
  publisher    = {{IEEE} Comptuer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/INFCOM.2001.916682},
  doi          = {10.1109/INFCOM.2001.916682},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/DemirkolECD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeviC00,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan},
  title        = {An Efficient, Dynamic and Trust Preserving Public Key Infrastructure},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {203--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848458},
  doi          = {10.1109/SECPRI.2000.848458},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LeviC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/OnurDEC00,
  author       = {Ertan Onur and
                  Hakan Deli{\c{c}} and
                  Cem Ersoy and
                  M. Ufuk {\c{C}}aglayan},
  title        = {On the retrial and redial phenomena in {GSM} networks},
  booktitle    = {2000 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2000, Chicago, IL, USA, September 23-28, 2000},
  pages        = {885--889},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/WCNC.2000.903974},
  doi          = {10.1109/WCNC.2000.903974},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/OnurDEC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/LeviC99,
  author       = {Albert Levi and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Analytical Performance Evaluation of Nested Certificates},
  journal      = {Perform. Evaluation},
  volume       = {36-37},
  number       = {1-4},
  pages        = {213--232},
  year         = {1999},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/LeviC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/LeviC99,
  author       = {Albert Levi and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Verification of classical certificates via nested certificates and
                  nested certificate paths},
  booktitle    = {Proceedings of the International Conference On Computer Communications
                  and Networks {(ICCCN} 1999), October 11-13, 1999, Boston, MA, {USA}},
  pages        = {242--247},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICCCN.1999.805526},
  doi          = {10.1109/ICCCN.1999.805526},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/LeviC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/OktugC97,
  author       = {Sema F. Oktug and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Design and Performance Evaluation of a Banyan Network Based Interconnection
                  Structure for {ATM} Switches},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {15},
  number       = {5},
  pages        = {807--816},
  year         = {1997},
  url          = {https://doi.org/10.1109/49.594843},
  doi          = {10.1109/49.594843},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/OktugC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/YauC83,
  author       = {Stephen S. Yau and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Distributed Software System Design Representation Using Modified Petri
                  Nets},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {9},
  number       = {6},
  pages        = {733--745},
  year         = {1983},
  url          = {https://doi.org/10.1109/TSE.1983.235581},
  doi          = {10.1109/TSE.1983.235581},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/YauC83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics