default search action
Alptekin Küpçü
Person information
- affiliation: Koç University, Istanbul, Turkey
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2010
- [b1]Alptekin Küpçü:
Efficient Cryptography for the Next Generation Secure Cloud. Brown University, USA, 2010
Journal Articles
- 2024
- [j26]Kerem Ozfatura, Emre Ozfatura, Alptekin Küpçü, Deniz Gündüz:
Byzantines Can Also Learn From History: Fall of Centered Clipping in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 2010-2022 (2024) - 2023
- [j25]Osama Daifallah Al-Khaleel, Selçuk Baktir, Alptekin Küpçü:
An ECC processor for IoT using Edwards curves and DFT modular multiplication. Clust. Comput. 26(2): 1063-1075 (2023) - [j24]Osman Biçer, Alptekin Küpçü:
FORTIS: Selfish Mining Mitigation by (FOR)geable (TI)me(S)tamps. Distributed Ledger Technol. Res. Pract. 2(4): 1-26 (2023) - 2022
- [j23]Mohammad Sadeq Dousti, Alptekin Küpçü:
Tri-op redactable blockchains with block modification, removal, and insertion. Turkish J. Electr. Eng. Comput. Sci. 30(2): 376-391 (2022) - [j22]Prashanthi Ramachandran, Nandini Agrawal, Osman Biçer, Alptekin Küpçü:
BlockSim-Net: a network-based blockchain simulator. Turkish J. Electr. Eng. Comput. Sci. 30(2): 392-405 (2022) - [j21]Handan Kilinç Alper, Alptekin Küpçü:
Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation. ACM Trans. Priv. Secur. 25(1): 3:1-3:34 (2022) - 2021
- [j20]Mohammad Etemad, Alptekin Küpçü:
Generic Dynamic Data Outsourcing Framework for Integrity Verification. ACM Comput. Surv. 53(1): 8:1-8:32 (2021) - [j19]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs. J. Parallel Distributed Comput. 149: 13-28 (2021) - [j18]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: Scalable DHT-Based Blockchain. IEEE Trans. Parallel Distributed Syst. 32(10): 2582-2593 (2021) - 2020
- [j17]Osman Biçer, Alptekin Küpçü:
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation. Proc. Priv. Enhancing Technol. 2020(4): 196-219 (2020) - [j16]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-preserving Group-based Advertising Using Multiple Independent Social Network Providers. ACM Trans. Priv. Secur. 23(3): 12:1-12:36 (2020) - [j15]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized Utility- and Locality-Aware Replication for Heterogeneous DHT-Based P2P Cloud Storage Systems. IEEE Trans. Parallel Distributed Syst. 31(5): 1183-1193 (2020) - 2019
- [j14]Mohammad Etemad, Alptekin Küpçü:
Verifiable dynamic searchable encryption. Turkish J. Electr. Eng. Comput. Sci. 27(4): 2606-2623 (2019) - [j13]Andreas Unterweger, Sanaz Taheri Boshrooyeh, Günther Eibl, Fabian Knirsch, Alptekin Küpçü, Dominik Engel:
Understanding Game-Based Privacy Proofs for Energy Consumption Aggregation Protocols. IEEE Trans. Smart Grid 10(5): 5514-5523 (2019) - 2018
- [j12]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized and locality aware replication method for DHT-based P2P storage systems. Future Gener. Comput. Syst. 84: 32-46 (2018) - [j11]Mohammad Etemad, Alptekin Küpçü:
Verifiable database outsourcing supporting join. J. Netw. Comput. Appl. 115: 1-19 (2018) - [j10]Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans:
Efficient Dynamic Searchable Encryption with Forward Privacy. Proc. Priv. Enhancing Technol. 2018(1): 5-20 (2018) - 2017
- [j9]Buket Yüksel, Alptekin Küpçü, Öznur Özkasap:
Research issues for privacy and security of electronic health services. Future Gener. Comput. Syst. 68: 1-13 (2017) - [j8]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability Via Oblivious RAM. J. Cryptol. 30(1): 22-57 (2017) - [j7]Alptekin Küpçü:
Incentivized Outsourced Computation Resistant to Malicious Contractors. IEEE Trans. Dependable Secur. Comput. 14(6): 633-649 (2017) - 2016
- [j6]Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap:
FlexDPDP: Flexlist-Based Optimized Dynamic Provable Data Possession. ACM Trans. Storage 12(4): 23:1-23:44 (2016) - 2015
- [j5]Alptekin Küpçü:
Official Arbitration with Secure Cloud Storage Application. Comput. J. 58(4): 831-852 (2015) - [j4]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. ACM Trans. Inf. Syst. Secur. 17(4): 15:1-15:29 (2015) - 2013
- [j3]Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single password authentication. Comput. Networks 57(13): 2597-2614 (2013) - [j2]Alptekin Küpçü:
Distributing trusted third parties. SIGACT News 44(2): 92-112 (2013) - 2012
- [j1]Alptekin Küpçü, Anna Lysyanskaya:
Usable optimistic fair exchange. Comput. Networks 56(1): 50-63 (2012)
Conference and Workshop Papers
- 2024
- [c41]Ferhat Karakoç, Alptekin Küpçü, Melek Önen:
Fault Tolerant and Malicious Secure Federated Learning. CANS (2) 2024: 73-95 - [c40]Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek:
SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier Detection. CANS (2) 2024: 118-142 - [c39]Ameer Taweel, Burcu Yildiz, Alptekin Küpçü:
Gamu Blue: A Practical Tool for Game Theory Security Equilibria. NOMS 2024: 1-6 - [c38]Irem Demir, Emel Küpçü, Alptekin Küpçü:
Extractive Summarization Data Sets Generated with Measurable Analyses. SIU 2024: 1-4 - 2022
- [c37]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks against Split Learning. WPES@CCS 2022: 115-124 - [c36]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. WPES@CCS 2022: 125-137 - 2021
- [c35]Handan Kilinç Alper, Alptekin Küpçü:
Coin-Based Multi-party Fair Exchange. ACNS (1) 2021: 130-160 - [c34]Osman Biçer, Burcu Yildiz, Alptekin Küpçü:
m-Stability: Threshold Security Meets Transferable Utility. CCSW 2021: 73-82 - [c33]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. DPM/CBT@ESORICS 2021: 245-261 - 2020
- [c32]Ferhat Karakoç, Alptekin Küpçü:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. CANS 2020: 409-429 - [c31]Mohammad Sadeq Dousti, Alptekin Küpçü:
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct. DPM/CBT@ESORICS 2020: 355-373 - [c30]Yahya Hassanzadeh-Nazarabadi, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
SkipSim: Scalable Skip Graph Simulator. IEEE ICBC 2020: 1-2 - [c29]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Öznur Özkasap, Alptekin Küpçü:
A containerized proof-of-concept implementation of LightChain system. IEEE ICBC 2020: 1-2 - [c28]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
Demo: Skip Graph Middleware Implementation. SRDS 2020: 335-337 - 2019
- [c27]Devris Isler, Alptekin Küpçü, Aykut Coskun:
User Perceptions of Security and Usability of Mobile-Based Single Password Authentication and Two-Factor Authentication. DPM/CBT@ESORICS 2019: 99-117 - 2018
- [c26]Seny Kamara, Alptekin Küpçü:
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring. ACNS 2018: 696-714 - [c25]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. Networking 2018: 514-522 - 2017
- [c24]Devris Isler, Alptekin Küpçü:
Threshold Single Password Authentication. DPM/CBT@ESORICS 2017: 143-162 - [c23]Sanaz Taheri Boshrooyeh, Alptekin Küpçü:
Inonymous: Anonymous Invitation-Based System. DPM/CBT@ESORICS 2017: 219-235 - [c22]Mohammad Etemad, Filipe Beato, Alptekin Küpçü, Bart Preneel:
Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks. EuroS&P Workshops 2017: 122-131 - 2016
- [c21]Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. CCSW 2016: 85-96 - [c20]Handan Kilinç, Alptekin Küpçü:
Efficiently Making Secure Two-Party Computation Fair. Financial Cryptography 2016: 188-207 - [c19]Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. Financial Cryptography 2016: 208-228 - [c18]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LARAS: Locality aware replication algorithm for the Skip Graph. NOMS 2016: 324-332 - [c17]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Awake: Decentralized and Availability Aware Replication for P2P Cloud Storage. SmartCloud 2016: 289-294 - 2015
- [c16]Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. CT-RSA 2015: 330-349 - [c15]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Locality Aware Skip Graph. ICDCS Workshops 2015: 105-111 - [c14]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Security and Privacy of Distributed Online Social Networks. ICDCS Workshops 2015: 112-119 - [c13]Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-End Communications. ProvSec 2015: 183-197 - 2014
- [c12]Ertem Esiner, Alptekin Küpçü, Öznur Özkasap:
Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession. ICC 2014: 65-83 - 2013
- [c11]Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. ACNS 2013: 1-18 - [c10]Adilet Kachkeev, Ertem Esiner, Alptekin Küpçü, Öznur Özkasap:
Energy Efficiency in Secure and Dynamic Cloud Storage. EE-LSDS 2013: 125-130 - [c9]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. EUROCRYPT 2013: 279-295 - [c8]Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. ICISC 2013: 381-399 - 2010
- [c7]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. CT-RSA 2010: 252-267 - [c6]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. ESORICS 2010: 488-507 - [c5]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - 2009
- [c4]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic provable data possession. CCS 2009: 213-222 - [c3]Alptekin Küpçü, Anna Lysyanskaya:
Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters. PODC 2009: 336-337 - 2008
- [c2]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing outsourced computation. NetEcon 2008: 85-90 - 2007
- [c1]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin:
Making p2p accountable without losing privacy. WPES 2007: 31-40
Informal and Other Publications
- 2024
- [i55]Ameer Taweel, Burcu Yildiz, Alptekin Küpçü:
Gamu Blue: A Practical Tool for Game Theory Security Equilibria. CoRR abs/2403.19130 (2024) - [i54]Emre Ozfatura, Kerem Ozfatura, Alptekin Küpçü, Deniz Gündüz:
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning. CoRR abs/2404.06230 (2024) - [i53]Halil Ibrahim Kanpak, Aqsa Shabbir, Esra Genç, Alptekin Küpçü, Sinem Sav:
CURE: Privacy-Preserving Split Learning Done Right. CoRR abs/2407.08977 (2024) - 2023
- [i52]Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek:
Defense Mechanisms Against Training-Hijacking Attacks in Split Learning. CoRR abs/2302.08618 (2023) - [i51]Ferhat Karakoç, Alptekin Küpçü:
Enabling Two-Party Secure Computation on Set Intersection. IACR Cryptol. ePrint Arch. 2023: 609 (2023) - 2022
- [i50]Kerem Ozfatura, Emre Ozfatura, Alptekin Küpçü, Deniz Gündüz:
Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning. CoRR abs/2208.09894 (2022) - [i49]Reza Ghasemi, Alptekin Küpçü:
A Post-Quantum Four-Party Outsourced Authentication. IACR Cryptol. ePrint Arch. 2022: 718 (2022) - 2021
- [i48]Günther Eibl, Sanaz Taheri Boshrooyeh, Alptekin Küpçü:
AggFT: Low-Cost Fault-Tolerant Smart Meter Aggregation with Proven Termination and Privacy. CoRR abs/2102.09429 (2021) - [i47]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning. CoRR abs/2108.09033 (2021) - [i46]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. CoRR abs/2108.09052 (2021) - [i45]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: Scalable DHT-Based Blockchain. CoRR abs/2109.00416 (2021) - [i44]Alptekin Küpçü, Reihaneh Safavi-Naini:
Smart Contracts for Incentivized Outsourcing of Computation. IACR Cryptol. ePrint Arch. 2021: 174 (2021) - [i43]Mohammad Sadeq Dousti, Alptekin Küpçü:
Tri-op redactable blockchains with block modification, removal, and insertion. IACR Cryptol. ePrint Arch. 2021: 724 (2021) - [i42]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning. IACR Cryptol. ePrint Arch. 2021: 1074 (2021) - [i41]Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek:
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. IACR Cryptol. ePrint Arch. 2021: 1080 (2021) - [i40]Osman Biçer, Burcu Yildiz, Alptekin Küpçü:
m-Stability: Threshold Security Meets Transferable Utility. IACR Cryptol. ePrint Arch. 2021: 1317 (2021) - 2020
- [i39]Faizan Safdar Ali, Alptekin Küpçü:
Improving PKI, BGP, and DNS Using Blockchain: A Systematic Review. CoRR abs/2001.00747 (2020) - [i38]Yahya Hassanzadeh-Nazarabadi, Ali Utkan Sahin, Öznur Özkasap, Alptekin Küpçü:
SkipSim: Scalable Skip Graph Simulator. CoRR abs/2007.13200 (2020) - [i37]Yahya Hassanzadeh-Nazarabadi, Nazir Nayal, Shadi Sameh Hamdan, Öznur Özkasap, Alptekin Küpçü:
A containerized proof-of-concept implementation of LightChain system. CoRR abs/2007.13203 (2020) - [i36]Nandini Agrawal, R. Prashanthi, Osman Biçer, Alptekin Küpçü:
BlockSim-Net: A Network Based Blockchain Simulator. CoRR abs/2011.03241 (2020) - [i35]Osman Biçer, Alptekin Küpçü:
Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation. IACR Cryptol. ePrint Arch. 2020: 817 (2020) - [i34]Ferhat Karakoç, Alptekin Küpçü:
Linear Complexity Private Set Intersection for Secure Two-Party Protocols. IACR Cryptol. ePrint Arch. 2020: 864 (2020) - [i33]Mohammad Sadeq Dousti, Alptekin Küpçü:
Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct. IACR Cryptol. ePrint Arch. 2020: 1039 (2020) - [i32]Osman Biçer, Alptekin Küpçü:
FORTIS: FORgeable TImeStamps Thwart Selfish Mining. IACR Cryptol. ePrint Arch. 2020: 1290 (2020) - 2019
- [i31]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Interlaced: Fully decentralized churn stabilization for Skip Graph-based DHTs. CoRR abs/1903.07289 (2019) - [i30]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. CoRR abs/1904.00375 (2019) - [i29]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
Decentralized utility- and locality-aware replication for heterogeneous DHT-based P2P cloud storage systems. CoRR abs/1907.11997 (2019) - [i28]Osman Biçer, Alptekin Küpçü:
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures. IACR Cryptol. ePrint Arch. 2019: 203 (2019) - [i27]Yahya Hassanzadeh-Nazarabadi, Alptekin Küpçü, Öznur Özkasap:
LightChain: A DHT-based Blockchain for Resource Constrained Environments. IACR Cryptol. ePrint Arch. 2019: 342 (2019) - [i26]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers. IACR Cryptol. ePrint Arch. 2019: 372 (2019) - [i25]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model. IACR Cryptol. ePrint Arch. 2019: 1215 (2019) - [i24]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
Integrita: Protecting View-Consistency in Online Social Network with Federated Servers. IACR Cryptol. ePrint Arch. 2019: 1223 (2019) - 2018
- [i23]Sanaz Taheri Boshrooyeh, Alptekin Küpçü, Öznur Özkasap:
PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks. IACR Cryptol. ePrint Arch. 2018: 323 (2018) - [i22]Devris Isler, Alptekin Küpçü, Aykut Coskun:
User Study on Single Password Authentication. IACR Cryptol. ePrint Arch. 2018: 975 (2018) - [i21]Devris Isler, Alptekin Küpçü:
Distributed Single Password Protocol Framework. IACR Cryptol. ePrint Arch. 2018: 976 (2018) - [i20]Devris Isler, Alptekin Küpçü:
Threshold Single Password Authentication. IACR Cryptol. ePrint Arch. 2018: 977 (2018) - 2017
- [i19]Mohammad Etemad, Alptekin Küpçü, Charalampos Papamanthou, David Evans:
Efficient Dynamic Searchable Encryption with Forward Privacy. CoRR abs/1710.00208 (2017) - 2016
- [i18]Mohammad Etemad, Alptekin Küpçü:
A Generic Dynamic Provable Data Possession Framework. IACR Cryptol. ePrint Arch. 2016: 748 (2016) - 2015
- [i17]Handan Kilinç, Alptekin Küpçü:
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. IACR Cryptol. ePrint Arch. 2015: 64 (2015) - [i16]Mohammad Etemad, Alptekin Küpçü:
Database Outsourcing with Hierarchical Authenticated Data Structures. IACR Cryptol. ePrint Arch. 2015: 351 (2015) - [i15]Mohammad Etemad, Alptekin Küpçü:
Efficient Key Authentication Service for Secure End-to-end Communications. IACR Cryptol. ePrint Arch. 2015: 833 (2015) - [i14]Mohammad Etemad, Alptekin Küpçü:
Generic Efficient Dynamic Proofs of Retrievability. IACR Cryptol. ePrint Arch. 2015: 880 (2015) - [i13]Alptekin Küpçü, Payman Mohassel:
Fast Optimistically Fair Cut-and-Choose 2PC. IACR Cryptol. ePrint Arch. 2015: 1209 (2015) - 2014
- [i12]Handan Kilinç, Alptekin Küpçü:
Efficiently Making Secure Two-Party Computation Fair. IACR Cryptol. ePrint Arch. 2014: 896 (2014) - [i11]Alptekin Küpçü:
Incentivized Outsourced Computation Resistant to Malicious Contractors. IACR Cryptol. ePrint Arch. 2014: 992 (2014) - 2013
- [i10]Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya:
Incentivizing Outsourced Computation. IACR Cryptol. ePrint Arch. 2013: 156 (2013) - [i9]Tolga Acar, Mira Belenkiy, Alptekin Küpçü:
Single Password Authentication. IACR Cryptol. ePrint Arch. 2013: 167 (2013) - [i8]Mohammad Etemad, Alptekin Küpçü:
Transparent, Distributed, and Replicated Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2013: 225 (2013) - [i7]Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap:
FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2013: 645 (2013) - 2012
- [i6]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptol. ePrint Arch. 2012: 226 (2012) - [i5]Alptekin Küpçü:
Official Arbitration and its Application to Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2012: 276 (2012) - [i4]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. IACR Cryptol. ePrint Arch. 2012: 550 (2012) - 2009
- [i3]Alptekin Küpçü, Anna Lysyanskaya:
Optimistic Fair Exchange with Multiple Arbiters. IACR Cryptol. ePrint Arch. 2009: 69 (2009) - 2008
- [i2]Alptekin Küpçü, Anna Lysyanskaya:
Usable Optimistic Fair Exchange. IACR Cryptol. ePrint Arch. 2008: 431 (2008) - [i1]C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
Dynamic Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 432 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint