Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: M. Ufuk Çaglayan
@inproceedings{DBLP:conf/6gnet/BulbulEBCA22, author = {Nurefsan Sertbas B{\"{u}}lb{\"{u}}l and Orhan Ermis and Serif Bahtiyar and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {Trust Enhanced Security for Routing in {SDN}}, booktitle = {1st International Conference on 6G Networking, 6GNet 2022, Paris, France, July 6-8, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/6GNet54646.2022.9830213}, doi = {10.1109/6GNET54646.2022.9830213}, timestamp = {Tue, 28 Nov 2023 14:51:11 +0100}, biburl = {https://dblp.org/rec/conf/6gnet/BulbulEBCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/Caglayan20, author = {M. Ufuk {\c{C}}aglayan}, editor = {Maria Carla Calzarossa and Erol Gelenbe and Krzysztof Grochla and Ricardo Lent and Tadeusz Czach{\'{o}}rski}, title = {Performance, Energy Savings and Security: An Introduction}, booktitle = {Modelling, Analysis, and Simulation of Computer and Telecommunication Systems - 28th International Symposium, {MASCOTS} 2020, Nice, France, November 17-19, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12527}, pages = {3--28}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68110-4\_1}, doi = {10.1007/978-3-030-68110-4\_1}, timestamp = {Mon, 03 Jan 2022 22:35:54 +0100}, biburl = {https://dblp.org/rec/conf/mascots/Caglayan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CantaliECE19, author = {Gokcan Cantali and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan and Cem Ersoy}, title = {Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems}, journal = {{ACM} Trans. Priv. Secur.}, volume = {22}, number = {4}, pages = {20:1--20:36}, year = {2019}, url = {https://doi.org/10.1145/3342998}, doi = {10.1145/3342998}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CantaliECE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/AytacECA18, author = {Samet Ayta{\c{c}} and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, editor = {Akka Zemmari and Mohamed Mosbah and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Authenticated Quality of Service Aware Routing in Software Defined Networks}, booktitle = {Risks and Security of Internet and Systems - 13th International Conference, CRiSIS 2018, Arcachon, France, October 16-18, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11391}, pages = {110--127}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12143-3\_10}, doi = {10.1007/978-3-030-12143-3\_10}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/AytacECA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocybersec/Caglayan18, author = {Mehmet Ufuk {\c{C}}aglayan}, editor = {Erol Gelenbe and Paolo Campegiani and Tadeusz Czach{\'{o}}rski and Sokratis K. Katsikas and Ioannis Komnios and Luigi Romano and Dimitrios Tzovaras}, title = {Some Current Cybersecurity Research in Europe}, booktitle = {Security in Computer and Information Sciences - First International {ISCIS} Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {821}, pages = {1--10}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95189-8\_1}, doi = {10.1007/978-3-319-95189-8\_1}, timestamp = {Fri, 31 Jan 2020 21:32:25 +0100}, biburl = {https://dblp.org/rec/conf/eurocybersec/Caglayan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ErmisBAC17, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {A secure and efficient group key agreement approach for mobile ad hoc networks}, journal = {Ad Hoc Networks}, volume = {67}, pages = {24--39}, year = {2017}, url = {https://doi.org/10.1016/j.adhoc.2017.10.003}, doi = {10.1016/J.ADHOC.2017.10.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ErmisBAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ErmisBAC17, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {A key agreement protocol with partial backward confidentiality}, journal = {Comput. Networks}, volume = {129}, pages = {159--177}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2017.09.008}, doi = {10.1016/J.COMNET.2017.09.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ErmisBAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/KulturC17, author = {Yigit Kultur and Mehmet Ufuk {\c{C}}aglayan}, title = {Hybrid approaches for detecting credit card fraud}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {34}, number = {2}, year = {2017}, url = {https://doi.org/10.1111/exsy.12191}, doi = {10.1111/EXSY.12191}, timestamp = {Tue, 26 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/KulturC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ErmisBAC17, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {62:1--62:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3104048}, doi = {10.1145/3098954.3104048}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ErmisBAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/BahtiyarEC17, author = {Serif Bahtiyar and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan}, editor = {Muhammad Younas and Markus Aleksy and Jamal Bentahar}, title = {A Framework for Trust Assessment of Security Systems on Flexible Networks}, booktitle = {5th {IEEE} International Conference on Future Internet of Things and Cloud, FiCloud 2017, Prague, Czech Republic, August 21-23, 2017}, pages = {177--182}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FiCloud.2017.23}, doi = {10.1109/FICLOUD.2017.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficloud/BahtiyarEC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/AkgunC16, author = {Mete Akg{\"{u}}n and Mehmet Ufuk {\c{C}}aglayan}, title = {Towards Scalable Identification in {RFID} Systems}, journal = {Wirel. Pers. Commun.}, volume = {86}, number = {2}, pages = {403--421}, year = {2016}, url = {https://doi.org/10.1007/s11277-015-2936-7}, doi = {10.1007/S11277-015-2936-7}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/AkgunC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiwis/BahtiyarEC16, author = {Serif Bahtiyar and Orhan Ermis and Mehmet Ufuk {\c{C}}aglayan}, editor = {Muhammad Younas and Irfan Awan and Natalia Kryvinska and Christine Strauss and Do Van Thanh}, title = {Adaptive Trust Scenarios for Mobile Security}, booktitle = {Mobile Web and Intelligent Information Systems - 13th International Conference, MobiWIS 2016, Vienna, Austria, August 22-24, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9847}, pages = {137--148}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44215-0\_11}, doi = {10.1007/978-3-319-44215-0\_11}, timestamp = {Sun, 02 Jun 2019 21:19:48 +0200}, biburl = {https://dblp.org/rec/conf/mobiwis/BahtiyarEC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AkgunC15, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan}, title = {Providing destructive privacy and scalability in {RFID} systems using PUFs}, journal = {Ad Hoc Networks}, volume = {32}, pages = {32--42}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.02.001}, doi = {10.1016/J.ADHOC.2015.02.001}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AkgunC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ErmisBAC15, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {An improved conference-key agreement protocol for dynamic groups with efficient fault correction}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1347--1359}, year = {2015}, url = {https://doi.org/10.1002/sec.1089}, doi = {10.1002/SEC.1089}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ErmisBAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DeveciC15, author = {Engin Deveci and Mehmet Ufuk {\c{C}}aglayan}, title = {Model driven security framework for software design and verification}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2768--2792}, year = {2015}, url = {https://doi.org/10.1002/sec.1200}, doi = {10.1002/SEC.1200}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DeveciC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AkgunBC15, author = {Mete Akg{\"{u}}n and Ali Osman Bayrak and Mehmet Ufuk {\c{C}}aglayan}, title = {Attacks and improvements to chaotic map-based {RFID} authentication protocol}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4028--4040}, year = {2015}, url = {https://doi.org/10.1002/sec.1319}, doi = {10.1002/SEC.1319}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AkgunBC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CantaliEGAC15, author = {Gokcan Cantali and Orhan Ermis and G{\"{u}}rkan G{\"{u}}r and Fatih Alag{\"{o}}z and M. Ufuk {\c{C}}aglayan}, title = {Lightweight context-aware security system for wireless Internet access}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {765--766}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346925}, doi = {10.1109/CNS.2015.7346925}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/CantaliEGAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/Caglayan15, author = {Mehmet Ufuk {\c{C}}aglayan}, editor = {Omer H. Abdelrahman and Erol Gelenbe and G{\"{o}}k{\c{c}}e G{\"{o}}rbil and Ricardo Lent}, title = {{ISCIS} and Erol Gelenbe's Contributions}, booktitle = {Information Sciences and Systems 2015 - 30th International Symposium on Computer and Information Sciences, {ISCIS} 2015, London, UK, 21-24 September 2015}, series = {Lecture Notes in Electrical Engineering}, volume = {363}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22635-4\_1}, doi = {10.1007/978-3-319-22635-4\_1}, timestamp = {Sat, 16 Sep 2017 12:11:33 +0200}, biburl = {https://dblp.org/rec/conf/iscis/Caglayan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/AkgunC15, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan}, title = {Weaknesses of two {RFID} protocols regarding de-synchronization attacks}, booktitle = {International Wireless Communications and Mobile Computing Conference, {IWCMC} 2015, Dubrovnik, Croatia, August 24-28, 2015}, pages = {828--833}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IWCMC.2015.7289190}, doi = {10.1109/IWCMC.2015.7289190}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/AkgunC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/BahtiyarC14, author = {Serif Bahtiyar and Mehmet Ufuk {\c{C}}aglayan}, title = {Trust assessment of security for e-health systems}, journal = {Electron. Commer. Res. Appl.}, volume = {13}, number = {3}, pages = {164--177}, year = {2014}, url = {https://doi.org/10.1016/j.elerap.2013.10.003}, doi = {10.1016/J.ELERAP.2013.10.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/BahtiyarC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/AkgunUC14, author = {Mete Akg{\"{u}}n and Tubitak Uekae and M. Ufuk {\c{C}}aglayan}, title = {Vulnerabilities of {RFID} Security Protocol Based on Chaotic Maps}, booktitle = {22nd {IEEE} International Conference on Network Protocols, {ICNP} 2014, Raleigh, NC, USA, October 21-24, 2014}, pages = {648--653}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICNP.2014.103}, doi = {10.1109/ICNP.2014.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/AkgunUC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/UnalC13, author = {Devrim Unal and Mehmet Ufuk {\c{C}}aglayan}, title = {A formal role-based access control model for security policies in multi-domain mobile networks}, journal = {Comput. Networks}, volume = {57}, number = {1}, pages = {330--350}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.09.018}, doi = {10.1016/J.COMNET.2012.09.018}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/UnalC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/BahtiyarC13, author = {Serif Bahtiyar and Mehmet Ufuk {\c{C}}aglayan}, title = {Security similarity based trust in cyber space}, journal = {Knowl. Based Syst.}, volume = {52}, pages = {290--301}, year = {2013}, url = {https://doi.org/10.1016/j.knosys.2013.08.012}, doi = {10.1016/J.KNOSYS.2013.08.012}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/BahtiyarC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UnalC13, author = {Devrim Unal and M. Ufuk {\c{C}}aglayan}, title = {{XFPM-RBAC:} XML-based specification language for security policies in multidomain mobile networks}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1420--1444}, year = {2013}, url = {https://doi.org/10.1002/sec.411}, doi = {10.1002/SEC.411}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/UnalC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/ErmisBAC13, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, title = {Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012, Las Vegas, NV, USA, December 2-6, 2013}, pages = {828--831}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCVE.2013.6799908}, doi = {10.1109/ICCVE.2013.6799908}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccve/ErmisBAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ErmisBAC13, author = {Orhan Ermis and Serif Bahtiyar and Emin Anarim and M. Ufuk {\c{C}}aglayan}, editor = {Atilla El{\c{c}}i and Manoj Singh Gaur and Mehmet A. Orgun and Oleg B. Makarevich}, title = {An improved fault-tolerant conference-key agreement protocol with forward secrecy}, booktitle = {The 6th International Conference on Security of Information and Networks, {SIN} '13, Aksaray, Turkey, November 26-28, 2013}, pages = {306--310}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523514.2527008}, doi = {10.1145/2523514.2527008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ErmisBAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkgunC13a, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan}, title = {Weaknesses in a Recently Proposed {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {855}, year = {2013}, url = {http://eprint.iacr.org/2013/855}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkgunC13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijahuc/OnemGC12, author = {E. Onem and A. Burak G{\"{u}}rdag and M. Ufuk {\c{C}}aglayan}, title = {Formal security analysis of Ariadne secure routing protocol using model checking}, journal = {Int. J. Ad Hoc Ubiquitous Comput.}, volume = {9}, number = {1}, pages = {12--24}, year = {2012}, url = {https://doi.org/10.1504/IJAHUC.2012.045537}, doi = {10.1504/IJAHUC.2012.045537}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijahuc/OnemGC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BahtiyarC12, author = {Serif Bahtiyar and Mehmet Ufuk {\c{C}}aglayan}, title = {Extracting trust information from security system of a service}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {1}, pages = {480--490}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.10.002}, doi = {10.1016/J.JNCA.2011.10.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/BahtiyarC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AkgunC11, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan}, title = {{PUF} Based Scalable Private {RFID} Authentication}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {473--478}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.73}, doi = {10.1109/ARES.2011.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/AkgunC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/BahtiyarCC10, author = {Serif Bahtiyar and Murat Cihan and Mehmet Ufuk {\c{C}}aglayan}, title = {A Model of Security Information Flow on Entities for Trust Computation}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {803--808}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.153}, doi = {10.1109/CIT.2010.153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/BahtiyarCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkgunGC10, author = {Mete Akg{\"{u}}n and Ali {\"{O}}zhan G{\"{u}}rel and Mehmet Ufuk {\c{C}}aglayan}, title = {Attacks to a lightweight {RFID} mutual authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678039/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkgunGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/UnalAC10, author = {Devrim Unal and Ozan Akar and M. Ufuk {\c{C}}aglayan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {155--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_12}, doi = {10.1007/978-3-642-14706-7\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/UnalAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AkgunC10, author = {Mete Akg{\"{u}}n and Mehmet Ufuk {\c{C}}aglayan}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {Extending an {RFID} Security and Privacy Model by Considering Forward Untraceability}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {239--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_16}, doi = {10.1007/978-3-642-22444-7\_16}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AkgunC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AkgunCA09, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan and Emin Anarim}, title = {Secure {RFID} Authentication with Efficient Key-Lookup}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425303}, doi = {10.1109/GLOCOM.2009.5425303}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/AkgunCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/AkgunCA09, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan and Emin Anarim}, title = {A new {RFID} authentication protocol with resistance to server impersonation}, booktitle = {23rd {IEEE} International Symposium on Parallel and Distributed Processing, {IPDPS} 2009, Rome, Italy, May 23-29, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IPDPS.2009.5161243}, doi = {10.1109/IPDPS.2009.5161243}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/AkgunCA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BahtiyarCC09, author = {Serif Bahtiyar and Murat Cihan and Mehmet Ufuk {\c{C}}aglayan}, editor = {Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Alexander G. Chefranov and Josef Pieprzyk and Yuri Anatolievich Bryukhomitsky and Siddika Berna {\"{O}}rs}, title = {An architectural approach for assessing system trust based on security policy specifications and security mechanisms}, booktitle = {Proceedings of the 2nd International Conference on Security of Information and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10, 2009}, pages = {71--74}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1626195.1626214}, doi = {10.1145/1626195.1626214}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/BahtiyarCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TschaC06, author = {Yeonghwan Tscha and Mehmet Ufuk {\c{C}}aglayan}, title = {Query slipping prevention for trajectory-based publishing and subscribing in wireless sensor networks}, journal = {Comput. Commun.}, volume = {29}, number = {11}, pages = {1979--1991}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2005.12.010}, doi = {10.1016/J.COMCOM.2005.12.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/TschaC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscn/IsciAC06, author = {Dilek Demirel Isci and Fatih Alag{\"{o}}z and M. Ufuk {\c{C}}aglayan}, title = {{IPSEC} over satellite links: a new flow identification method}, booktitle = {Proceedings of the International Symposium on Computer Networks, {ISCN} 2006, June 16-18, 2006, Istanbul, Turkey}, pages = {140--145}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCN.2006.1662523}, doi = {10.1109/ISCN.2006.1662523}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscn/IsciAC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscn/UnalC06, author = {Devrim Unal and M. Ufuk {\c{C}}aglayan}, title = {Theorem proving for modeling and conflict checking of authorization policies}, booktitle = {Proceedings of the International Symposium on Computer Networks, {ISCN} 2006, June 16-18, 2006, Istanbul, Turkey}, pages = {146--151}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISCN.2006.1662524}, doi = {10.1109/ISCN.2006.1662524}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscn/UnalC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ParkTLC05, author = {Junseok Park and Yeonghwan Tscha and Kyoon Ha Lee and M. Ufuk {\c{C}}aglayan}, title = {Query slipping prevention for trajectory-based matchmaking service in wireless sensor networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2005, Seoul, Korea, 16-20 May 2005}, pages = {3050--3056}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ICC.2005.1494955}, doi = {10.1109/ICC.2005.1494955}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ParkTLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/CalikliC05, author = {Handan G{\"{u}}l {\c{C}}alikli and M. Ufuk {\c{C}}aglayan}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {A Formal Policy Specification Language for an 802.11 {WLAN} with Enhanced Security Network}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {183--192}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_21}, doi = {10.1007/11569596\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/CalikliC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/Caglayan05, author = {M. Ufuk {\c{C}}aglayan}, editor = {Pinar Yolum and Tunga G{\"{u}}ng{\"{o}}r and Fikret S. G{\"{u}}rgen and Can C. {\"{O}}zturan}, title = {Erol Gelenbe's Career and Contributions}, booktitle = {Computer and Information Sciences - {ISCIS} 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3733}, pages = {966--970}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11569596\_98}, doi = {10.1007/11569596\_98}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/Caglayan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/others/05/TurgutC05, author = {B. Turgut and M. Ufuk {\c{C}}aglayan}, editor = {Tuna Tugcu and Erol Gelenbe and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {An {AAA} based solution for the Secure Interoperability of 3G and 802.11 Networks}, booktitle = {New Trends in Computer Networks}, series = {Advances in Computer Science and Engineering : Reports and Monographs}, volume = {1}, publisher = {Imperial College Press}, year = {2005}, url = {https://doi.org/10.1142/9781860947308\_0036}, doi = {10.1142/9781860947308\_0036}, timestamp = {Mon, 22 Jun 2020 14:58:58 +0200}, biburl = {https://dblp.org/rec/books/others/05/TurgutC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/others/05/TGCA2005, editor = {Tuna Tugcu and Erol Gelenbe and M. Ufuk {\c{C}}aglayan and Fatih Alag{\"{o}}z}, title = {New Trends in Computer Networks}, series = {Advances in Computer Science and Engineering : Reports and Monographs}, volume = {1}, publisher = {Imperial College Press}, year = {2005}, url = {https://doi.org/10.1142/p415}, doi = {10.1142/P415}, isbn = {978-1-86094-611-0}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/others/05/TGCA2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LeviCK04, author = {Albert Levi and M. Ufuk {\c{C}}aglayan and {\c{C}}etin Kaya Ko{\c{c}}}, title = {Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {21--59}, year = {2004}, url = {https://doi.org/10.1145/984334.984336}, doi = {10.1145/984334.984336}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/LeviCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/DemirkolECD04, author = {Ilker Demirkol and Cem Ersoy and Mehmet Ufuk {\c{C}}aglayan and Hakan Deli{\c{c}}}, title = {Location area planning and cell-to-switch assignment in cellular networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {3}, number = {3}, pages = {880--890}, year = {2004}, url = {https://doi.org/10.1109/TWC.2004.827767}, doi = {10.1109/TWC.2004.827767}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/DemirkolECD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscis/LeviCAKC04, author = {Albert Levi and Erhan {\c{C}}etintas and Murat Aydos and {\c{C}}etin Kaya Ko{\c{c}} and M. Ufuk {\c{C}}aglayan}, editor = {Cevdet Aykanat and Tugrul Dayar and Ibrahim Korpeoglu}, title = {Relay Attacks on Bluetooth Authentication and Solutions}, booktitle = {Computer and Information Sciences - {ISCIS} 2004, 19th International Symposium, Kemer-Antalya, Turkey, October 27-29, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3280}, pages = {278--288}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30182-0\_29}, doi = {10.1007/978-3-540-30182-0\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscis/LeviCAKC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/TezcanCC04, author = {Nurcan Tezcan and Erdal Cayirci and M. Ufuk {\c{C}}aglayan}, title = {End-to-end reliable event transfer in wireless sensor networks}, booktitle = {Proceedings of the {IEEE} 15th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2004, 5-8 September 2004, Barcelona, Spain}, pages = {989--994}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/PIMRC.2004.1373847}, doi = {10.1109/PIMRC.2004.1373847}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/TezcanCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OnurDEC02, author = {Ertan Onur and Hakan Deli{\c{c}} and Cem Ersoy and M. Ufuk {\c{C}}aglayan}, title = {Measurement-based replanning of cell capacities in {GSM} networks}, journal = {Comput. Networks}, volume = {39}, number = {6}, pages = {749--767}, year = {2002}, url = {https://doi.org/10.1016/S1389-1286(02)00230-X}, doi = {10.1016/S1389-1286(02)00230-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/OnurDEC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/OnurDEC02, author = {Ertan Onur and Hakan Deli{\c{c}} and Cem Ersoy and Mehmet Ufuk {\c{C}}aglayan}, title = {Measurement-based replanning of {GSM} cell capacities considering retrials, redials and hand-offs}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2002, April 28 - May 2, 2002, New York City, NY, {USA}}, pages = {3361--3365}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ICC.2002.997454}, doi = {10.1109/ICC.2002.997454}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/OnurDEC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/DemirkolECD01, author = {Ilker Demirkol and Cem Ersoy and M. Ufuk {\c{C}}aglayan and Hakan Deli{\c{c}}}, title = {Location Area Planning in Cellular Networks Using Simulated Annealing}, booktitle = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications, Twentieth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Twenty years into the communications odyssey, Anchorage, Alaska, USA, April 22-26, 2001}, pages = {13--20}, publisher = {{IEEE} Comptuer Society}, year = {2001}, url = {https://doi.org/10.1109/INFCOM.2001.916682}, doi = {10.1109/INFCOM.2001.916682}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/DemirkolECD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LeviC00, author = {Albert Levi and M. Ufuk {\c{C}}aglayan}, title = {An Efficient, Dynamic and Trust Preserving Public Key Infrastructure}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {203--214}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848458}, doi = {10.1109/SECPRI.2000.848458}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/LeviC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/OnurDEC00, author = {Ertan Onur and Hakan Deli{\c{c}} and Cem Ersoy and M. Ufuk {\c{C}}aglayan}, title = {On the retrial and redial phenomena in {GSM} networks}, booktitle = {2000 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2000, Chicago, IL, USA, September 23-28, 2000}, pages = {885--889}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/WCNC.2000.903974}, doi = {10.1109/WCNC.2000.903974}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/OnurDEC00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/LeviC99, author = {Albert Levi and M. Ufuk {\c{C}}aglayan}, title = {Analytical Performance Evaluation of Nested Certificates}, journal = {Perform. Evaluation}, volume = {36-37}, number = {1-4}, pages = {213--232}, year = {1999}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/LeviC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/LeviC99, author = {Albert Levi and Mehmet Ufuk {\c{C}}aglayan}, title = {Verification of classical certificates via nested certificates and nested certificate paths}, booktitle = {Proceedings of the International Conference On Computer Communications and Networks {(ICCCN} 1999), October 11-13, 1999, Boston, MA, {USA}}, pages = {242--247}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICCCN.1999.805526}, doi = {10.1109/ICCCN.1999.805526}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/LeviC99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/OktugC97, author = {Sema F. Oktug and Mehmet Ufuk {\c{C}}aglayan}, title = {Design and Performance Evaluation of a Banyan Network Based Interconnection Structure for {ATM} Switches}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {15}, number = {5}, pages = {807--816}, year = {1997}, url = {https://doi.org/10.1109/49.594843}, doi = {10.1109/49.594843}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/OktugC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/YauC83, author = {Stephen S. Yau and Mehmet Ufuk {\c{C}}aglayan}, title = {Distributed Software System Design Representation Using Modified Petri Nets}, journal = {{IEEE} Trans. Software Eng.}, volume = {9}, number = {6}, pages = {733--745}, year = {1983}, url = {https://doi.org/10.1109/TSE.1983.235581}, doi = {10.1109/TSE.1983.235581}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/YauC83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.