


default search action
M. Ufuk Çaglayan
Person information
- affiliation: Bogaziçi University, Turkey
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c33]Nurefsan Sertbas Bülbül, Orhan Ermis, Serif Bahtiyar
, M. Ufuk Çaglayan, Fatih Alagöz:
Trust Enhanced Security for Routing in SDN. 6GNet 2022: 1-6 - 2020
- [c32]M. Ufuk Çaglayan:
Performance, Energy Savings and Security: An Introduction. MASCOTS (Revised Selected Papers) 2020: 3-28
2010 – 2019
- 2019
- [j22]Gokcan Cantali, Orhan Ermis, Mehmet Ufuk Çaglayan, Cem Ersoy
:
Analytical Models for the Scalability of Dynamic Group-key Agreement Protocols and Secure File Sharing Systems. ACM Trans. Priv. Secur. 22(4): 20:1-20:36 (2019) - 2018
- [c31]Samet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz:
Authenticated Quality of Service Aware Routing in Software Defined Networks. CRiSIS 2018: 110-127 - [c30]Mehmet Ufuk Çaglayan:
Some Current Cybersecurity Research in Europe. Euro-CYBERSEC 2018: 1-10 - 2017
- [j21]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
A secure and efficient group key agreement approach for mobile ad hoc networks. Ad Hoc Networks 67: 24-39 (2017) - [j20]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
A key agreement protocol with partial backward confidentiality. Comput. Networks 129: 159-177 (2017) - [j19]Yigit Kultur, Mehmet Ufuk Çaglayan:
Hybrid approaches for detecting credit card fraud. Expert Syst. J. Knowl. Eng. 34(2) (2017) - [c29]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols. ARES 2017: 62:1-62:6 - [c28]Serif Bahtiyar
, Orhan Ermis, Mehmet Ufuk Çaglayan:
A Framework for Trust Assessment of Security Systems on Flexible Networks. FiCloud 2017: 177-182 - 2016
- [j18]Mete Akgün, Mehmet Ufuk Çaglayan:
Towards Scalable Identification in RFID Systems. Wirel. Pers. Commun. 86(2): 403-421 (2016) - [c27]Serif Bahtiyar
, Orhan Ermis, Mehmet Ufuk Çaglayan:
Adaptive Trust Scenarios for Mobile Security. MobiWIS 2016: 137-148 - 2015
- [j17]Mete Akgün, M. Ufuk Çaglayan
:
Providing destructive privacy and scalability in RFID systems using PUFs. Ad Hoc Networks 32: 32-42 (2015) - [j16]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan
:
An improved conference-key agreement protocol for dynamic groups with efficient fault correction. Secur. Commun. Networks 8(7): 1347-1359 (2015) - [j15]Engin Deveci, Mehmet Ufuk Çaglayan
:
Model driven security framework for software design and verification. Secur. Commun. Networks 8(16): 2768-2792 (2015) - [j14]Mete Akgün, Ali Osman Bayrak, Mehmet Ufuk Çaglayan:
Attacks and improvements to chaotic map-based RFID authentication protocol. Secur. Commun. Networks 8(18): 4028-4040 (2015) - [c26]Gokcan Cantali, Orhan Ermis, Gürkan Gür
, Fatih Alagöz, M. Ufuk Çaglayan:
Lightweight context-aware security system for wireless Internet access. CNS 2015: 765-766 - [c25]Mehmet Ufuk Çaglayan:
ISCIS and Erol Gelenbe's Contributions. ISCIS 2015: 3-17 - [c24]Mete Akgün, M. Ufuk Çaglayan:
Weaknesses of two RFID protocols regarding de-synchronization attacks. IWCMC 2015: 828-833 - 2014
- [j13]Serif Bahtiyar
, Mehmet Ufuk Çaglayan
:
Trust assessment of security for e-health systems. Electron. Commer. Res. Appl. 13(3): 164-177 (2014) - [c23]Mete Akgün, Tubitak Uekae, M. Ufuk Çaglayan:
Vulnerabilities of RFID Security Protocol Based on Chaotic Maps. ICNP 2014: 648-653 - 2013
- [j12]Devrim Unal
, Mehmet Ufuk Çaglayan
:
A formal role-based access control model for security policies in multi-domain mobile networks. Comput. Networks 57(1): 330-350 (2013) - [j11]Serif Bahtiyar
, Mehmet Ufuk Çaglayan
:
Security similarity based trust in cyber space. Knowl. Based Syst. 52: 290-301 (2013) - [j10]Devrim Unal
, M. Ufuk Çaglayan
:
XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks. Secur. Commun. Networks 6(12): 1420-1444 (2013) - [c22]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
Open problems for group-key agreement protocols on Vehicular Ad-hoc Networks. ICCVE 2013: 828-831 - [c21]Orhan Ermis, Serif Bahtiyar
, Emin Anarim
, M. Ufuk Çaglayan:
An improved fault-tolerant conference-key agreement protocol with forward secrecy. SIN 2013: 306-310 - [i1]Mete Akgün, M. Ufuk Çaglayan:
Weaknesses in a Recently Proposed RFID Authentication Protocol. IACR Cryptol. ePrint Arch. 2013: 855 (2013) - 2012
- [j9]E. Onem, A. Burak Gürdag, M. Ufuk Çaglayan
:
Formal security analysis of Ariadne secure routing protocol using model checking. Int. J. Ad Hoc Ubiquitous Comput. 9(1): 12-24 (2012) - [j8]Serif Bahtiyar
, Mehmet Ufuk Çaglayan
:
Extracting trust information from security system of a service. J. Netw. Comput. Appl. 35(1): 480-490 (2012) - 2011
- [c20]Mete Akgün, M. Ufuk Çaglayan:
PUF Based Scalable Private RFID Authentication. ARES 2011: 473-478 - 2010
- [c19]Serif Bahtiyar
, Murat Cihan, Mehmet Ufuk Çaglayan:
A Model of Security Information Flow on Entities for Trust Computation. CIT 2010: 803-808 - [c18]Mete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan:
Attacks to a lightweight RFID mutual authentication protocol. ICITST 2010: 1-5 - [c17]Devrim Unal
, Ozan Akar, M. Ufuk Çaglayan:
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. MMM-ACNS 2010: 155-168 - [c16]Mete Akgün, Mehmet Ufuk Çaglayan:
Extending an RFID Security and Privacy Model by Considering Forward Untraceability. STM 2010: 239-254
2000 – 2009
- 2009
- [c15]Mete Akgün, M. Ufuk Çaglayan, Emin Anarim
:
Secure RFID Authentication with Efficient Key-Lookup. GLOBECOM 2009: 1-8 - [c14]Mete Akgün, M. Ufuk Çaglayan, Emin Anarim
:
A new RFID authentication protocol with resistance to server impersonation. IPDPS 2009: 1-8 - [c13]Serif Bahtiyar
, Murat Cihan, Mehmet Ufuk Çaglayan:
An architectural approach for assessing system trust based on security policy specifications and security mechanisms. SIN 2009: 71-74 - 2006
- [j7]Yeonghwan Tscha, Mehmet Ufuk Çaglayan
:
Query slipping prevention for trajectory-based publishing and subscribing in wireless sensor networks. Comput. Commun. 29(11): 1979-1991 (2006) - [c12]Dilek Demirel Isci, Fatih Alagöz, M. Ufuk Çaglayan:
IPSEC over satellite links: a new flow identification method. ISCN 2006: 140-145 - [c11]Devrim Unal
, M. Ufuk Çaglayan:
Theorem proving for modeling and conflict checking of authorization policies. ISCN 2006: 146-151 - 2005
- [c10]Junseok Park, Yeonghwan Tscha, Kyoon Ha Lee, M. Ufuk Çaglayan:
Query slipping prevention for trajectory-based matchmaking service in wireless sensor networks. ICC 2005: 3050-3056 - [c9]Handan Gül Çalikli
, M. Ufuk Çaglayan:
A Formal Policy Specification Language for an 802.11 WLAN with Enhanced Security Network. ISCIS 2005: 183-192 - [c8]M. Ufuk Çaglayan:
Erol Gelenbe's Career and Contributions. ISCIS 2005: 966-970 - [p1]B. Turgut, M. Ufuk Çaglayan:
An AAA based solution for the Secure Interoperability of 3G and 802.11 Networks. New Trends in Computer Networks 2005 - [e1]Tuna Tugcu, Erol Gelenbe, M. Ufuk Çaglayan, Fatih Alagöz:
New Trends in Computer Networks. Advances in Computer Science and Engineering : Reports and Monographs 1, Imperial College Press 2005, ISBN 978-1-86094-611-0 [contents] - 2004
- [j6]Albert Levi
, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst. Secur. 7(1): 21-59 (2004) - [j5]Ilker Demirkol
, Cem Ersoy
, Mehmet Ufuk Çaglayan
, Hakan Deliç:
Location area planning and cell-to-switch assignment in cellular networks. IEEE Trans. Wirel. Commun. 3(3): 880-890 (2004) - [c7]Albert Levi
, Erhan Çetintas, Murat Aydos
, Çetin Kaya Koç
, M. Ufuk Çaglayan:
Relay Attacks on Bluetooth Authentication and Solutions. ISCIS 2004: 278-288 - [c6]Nurcan Tezcan, Erdal Cayirci, M. Ufuk Çaglayan
:
End-to-end reliable event transfer in wireless sensor networks. PIMRC 2004: 989-994 - 2002
- [j4]Ertan Onur
, Hakan Deliç, Cem Ersoy
, M. Ufuk Çaglayan
:
Measurement-based replanning of cell capacities in GSM networks. Comput. Networks 39(6): 749-767 (2002) - [c5]Ertan Onur, Hakan Deliç, Cem Ersoy
, Mehmet Ufuk Çaglayan:
Measurement-based replanning of GSM cell capacities considering retrials, redials and hand-offs. ICC 2002: 3361-3365 - 2001
- [c4]Ilker Demirkol, Cem Ersoy
, M. Ufuk Çaglayan, Hakan Deliç:
Location Area Planning in Cellular Networks Using Simulated Annealing. INFOCOM 2001: 13-20 - 2000
- [c3]Albert Levi, M. Ufuk Çaglayan
:
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. S&P 2000: 203-214 - [c2]Ertan Onur, Hakan Deliç, Cem Ersoy
, M. Ufuk Çaglayan:
On the retrial and redial phenomena in GSM networks. WCNC 2000: 885-889
1990 – 1999
- 1999
- [j3]Albert Levi, M. Ufuk Çaglayan:
Analytical Performance Evaluation of Nested Certificates. Perform. Evaluation 36-37(1-4): 213-232 (1999) - [c1]Albert Levi
, Mehmet Ufuk Çaglayan:
Verification of classical certificates via nested certificates and nested certificate paths. ICCCN 1999: 242-247 - 1997
- [j2]Sema F. Oktug
, Mehmet Ufuk Çaglayan
:
Design and Performance Evaluation of a Banyan Network Based Interconnection Structure for ATM Switches. IEEE J. Sel. Areas Commun. 15(5): 807-816 (1997)
1980 – 1989
- 1983
- [j1]Stephen S. Yau, Mehmet Ufuk Çaglayan
:
Distributed Software System Design Representation Using Modified Petri Nets. IEEE Trans. Software Eng. 9(6): 733-745 (1983)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint