Makaleler
81
Tümü (81)
SCI-E, SSCI, AHCI (55)
SCI-E, SSCI, AHCI, ESCI (56)
ESCI (1)
Scopus (57)
TRDizin (14)
Diğer Yayınlar (12)
2. Formal Analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
IEEE ACCESS
, cilt.12, ss.1672-1687, 2024 (SCI-Expanded)
5. Modified graph-based algorithm to analyze security threats in IoT
PEERJ COMPUTER SCIENCE
, cilt.9, ss.1-22, 2023 (SCI-Expanded)
11. Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
, cilt.26, sa.2, ss.865-878, 2023 (SCI-Expanded)
14. A novel Android malware detection system: adaption of filter-based feature selection methods
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING
, cilt.14, ss.1243-1257, 2023 (SCI-Expanded)
23. A constant-size lattice-based partially-dynamic group signature scheme in quantum random oracle model
Journal of King Saud University - Computer and Information Sciences
, cilt.34, sa.10, ss.9852-9866, 2022 (SCI-Expanded)
26. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
, cilt.25, sa.3, ss.1729-1748, 2022 (SCI-Expanded)
45. NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA
Mühendislik Bilimleri ve Tasarım Dergisi
, cilt.8, sa.5, ss.80-89, 2020 (Hakemli Dergi)
46. Parola Tabanlı SIMSec Protokolü
Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi
, cilt.11, sa.3, ss.1021-1030, 2020 (Hakemli Dergi)
49. JAVA LIBRARY FOR LATTICE-BASED IDENTIFICATION SCHEMES
Journal of Modern Technology and Engineering
, cilt.5, sa.1, ss.5-17, 2020 (Hakemli Dergi)
50. Efficient GeMSS Based Ring Signature Scheme
Malaysian Journal of Computing and Applied Mathematics
, cilt.3, sa.2, 2020 (Hakemli Dergi)
51. On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES
, cilt.28, sa.1, ss.275-287, 2020 (SCI-Expanded)
53. New Signature Algorithm Based on Concatenated Rank Codes
Malaysian Journal of Computing and Applied Mathematics
, cilt.2, sa.2, ss.25-31, 2019 (Hakemli Dergi)
55. İş Sağlığı ve Güvenliği Sektöründe Bayes Ağları Uygulaması
Bilgisayar Bilimleri ve Mühendisliği Dergisi
, cilt.12, sa.1, ss.47-59, 2019 (Hakemli Dergi)
57. IoT Çağında Güvenlik Tehditleri ve Çözümleri Üzerine Bir Araştırma
Avrupa Bilim ve Teknoloji Dergisi
, cilt.15, ss.36-42, 2019 (Hakemli Dergi)
72. A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
, cilt.E96A, sa.10, ss.2016-2024, 2013 (SCI-Expanded)
76. A New Short Signature Scheme with Random Oracle from Bilinear Pairings
Journal of Telecommunications and Information Technology
, cilt.5, sa.1, ss.5-11, 2011 (Hakemli Dergi)
77. Open Source UTM Alternative ClearOS
Proceeding of the third International Conference “Problems of Cybernetics and Informatics, PCI’ 2010
, cilt.1, ss.211-212, 2010 (Hakemli Dergi)
80. A modified algorithm for peer-to-peer security
Applied and Computational Mathematics
, cilt.7, sa.1, ss.1-14, 2007 (Hakemli Dergi)
Hakemli Bilimsel Toplantılarda Yayımlanmış Bildiriler
97
4. Lattice-Based Cryptography, Lattices, NP-Hard Problems in Lattices (SIS, SVP, etc)
Intermediate and Advanced Course on Post-Quantum Cryptography, Baku, Azerbaycan, 5 - 10 Eylül 2022, (Tam Metin Bildiri)
5. End-to-End Encrypted Instant Message Application of Post-Quantum Secure Key Encapsulation Mechanisms for Mobile Applications
International Conference on Science, Engineering Management and Information Technology, Ankara, Türkiye, 08 Eylül 2022, (Tam Metin Bildiri)
9. Kafes Tabanlı Anahtar Değişim Protokolleri, Uzlaşma Mekanizmaları ve Sinyal Sızıntısı Atakları
3. Kuantum Sonrası Kriptografi Çalıştayı, Türkiye, 29 - 30 Mart 2022, (Tam Metin Bildiri)
10. On the Construction Structures of 3x3 Involutory MDS Matrices over F_2^m
ICNDA 2022 International Conference on Nonlinear Dynamics and Applications, Majitar, Hindistan, 9 - 12 Mart 2022, (Tam Metin Bildiri)
11. Challenges and Opportunities in Cryptography
The 6th International Conference of Reliable Information and Communication Technology, Suudi Arabistan, 22 - 23 Aralık 2021, (Özet Bildiri)
38. Efficient GeMSS Based Ring Signature Scheme
The Second International Workshop on Cryptography and its Applications – 2’IWCA’19, Oran, Cezayir, 18 - 19 Haziran 2019, (Tam Metin Bildiri)
48. GUI Based Ring Signature Scheme
18th Central European Conference on Cryptology (CECC 2018), Smolenice, Slovakya, 6 - 08 Haziran 2018, ss.1-3, (Tam Metin Bildiri)
56. Fast NTRU Encryption in GPU for Secure IoP Communication in Post-quantum Era
IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, Çin, 7 - 11 Kasım 2018, ss.1923-1928, (Tam Metin Bildiri)
63. Reducing Key Sizes in Rainbow: Partially Hadamard-Rainbow
The 3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, Tiflis, Gürcistan, 6 - 09 Aralık 2017, cilt.3, ss.68, (Özet Bildiri)
64. On the Generalization of Linear-In-One-Argument Form of Multivariate Polynomials for Post-Quantum Cryptography
3rd International Conference on Applications of Mathematics and Informatics in Natural Sciences and Engineering, 6 - 09 Aralık 2017, cilt.3, ss.70-73, (Özet Bildiri)
65. A Reliable and Energy-Efficient Routing Protocol for Wireless Sensor Networks in Large Scale
8 th International Advanced Technologies Sympoium, Elazığ, Türkiye, 19 - 22 Ekim 2017, ss.3733-3738, (Tam Metin Bildiri)
66. Üç Terimli Polinomlar için Karatsuba Benzeri Çarpma Yöntemlerinin Araştırılması
10th International Conference on Information Security and Cryptology, 20 - 21 Ekim 2017, cilt.10, ss.1-7, (Tam Metin Bildiri)
69. Optimizing Reliability and Energy in Wireless Sensor Networks with an Effective Topology
International Conference on Theoretical and Application Problems of Mathematics, 25 - 26 Mayıs 2017, cilt.1, ss.21, (Özet Bildiri)
75. Some Results on MDS Matrices
9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.35, (Tam Metin Bildiri)
76. Speeding up Number Theoretic Transform Lazy Reductions Explained
9th International Conference on Information Security and Cryptology (ISCTURKEY 2016), Türkiye, 25 - 26 Ekim 2016, cilt.9, ss.115-119, (Tam Metin Bildiri)
77. A Reliable and Energy Efficient Routing Protocol for Wireless Sensor Networks
International Conference on Computer Science and Engineering, Türkiye, 20 - 23 Ekim 2016, cilt.75, (Tam Metin Bildiri)
78. Efficient Methods for Lattice based Cryptography
The 5th International Workshop on Cryptography and its Applications - IWCA’ 2016, Cezayir, 26 - 27 Nisan 2016
79. Post Quantum Cryptography An Introduction
3rd INTERNATIONAL CONFERENCE ON CONVERGENCE TECHNOLOGY MANAGEMENT (CTM-2016), Hindistan, 1 - 02 Nisan 2016
80. Efficient Interleaved Montgomery Modular Multiplication Method for Sparse Polynomials for Lattice Based Cryptography
3rd International Conference on “Converging Technologies & Management (CTM-2016), Hindistan, 1 - 02 Nisan 2016, (Özet Bildiri)
83. Arithmetic Operations in Lattice Based Cryptography
International Scientific Conference of Students and Young Scientists Theoretical and Applied Aspects of Cybernetics, Kiev, Ukrayna, 23 - 27 Kasım 2015, (Özet Bildiri)
88. Kriptoloji ve Uygulama Alanları Açık Anahtar Altyapısı ve Kayıtlı Elektronik Posta
Akademik Bilişim 2011, Malatya, Türkiye, 2 - 04 Şubat 2011, ss.723-728, (Tam Metin Bildiri)
91. Open Source UTM Alternative ClearOS
Proceeding of the third International Conference “Problems of Cybernetics and Informatics, 08 Eylül 2010, (Tam Metin Bildiri)
93. Substitution Boxes of the Third Generation GSM and Advanced Encryption Standard Ciphers
Information Security and Cryptology Conference, 13 - 15 Aralık 2007, ss.157-163, (Tam Metin Bildiri)
94. A note on Knapsack Cryptosystems
International scientific conference “Information Technologies and Telecommunications in Education and Science, 06 Ekim 2007, (Tam Metin Bildiri)
95. Security Analysis and Proposed Solutions About Wireless Campus Networks of Universities in Türkiye
Proceeding of the 3-th International conference on Information Technologies and Telecommunication (IT T C 2007), 06 Ekim 2007, (Tam Metin Bildiri)
97. Securty of online Learning
International scientific conference “Information Technologies and Telecommunications in Education and Science” (IT T ES’2005), 22 Mayıs 2005, (Tam Metin Bildiri)
Kitaplar
24
3. Collecting Health Information with LoRa Technology
Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.429-439, 2023
4. A New Hybrid Method for Indoor Positioning
Smart Applications with Advanced Machine Learning and Human-Centred Problem Design, , Editör, Springer International Publishing, ss.441-451, 2023
11. Kafes Tabanlı Grup İmzalama Şemalarının Özellikleri Ve Değerlendirilmesi
Siber Güvenlik ve Savunma: BlokZincir ve Kriptoloji, Sağıroğlu Şeref, Akleylek Sedat, Editör, Nobel Akademik Yayıncılık Eğitim Danışmanlık Ltdi. Şti., Ankara, ss.491-541, 2021
16. Kafes Tabanlı Kriptografide Kullanılan Zor Problemlerin Kriptanalizi ve Yazılım Kütüphaneleri
SİBER GÜVENLİK VE SAVUNMA:Biyometrik ve Kriptografik Uygulamalar, Sağıroğlu Şeref, Akleylek Sedat, Editör, NOBEL AKADEMİK YAYINCILIK EĞİTİM DANIŞMANLIK TİC. LTD. ŞTİ., Ankara, ss.233-256, 2020
20. Identification schemes in the post-quantum area based on multivariate polynomials with applications in cloud and IoT
Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.181-207, 2019
21. Kuantum Bilgisayarlar ile Kriptoanaliz ve Kuantum Sonrası Güvenilir Kripto Sistemleri
Siber Güvenlik ve Savunma: Farkındalık ve Caydırıcılık Cilt II, Prof. Dr. Şeref Sağıroğlu, Mustafa Şenol, Editör, Grafiker Yayınları, Ankara, ss.137-168, 2019
22. Lightweight Block Ciphers with Applications in IoT
Authentication Technologies for Cloud Technology, IoT, and Big Data, Dr, Yasser M. Alginahi Dr. Muhammad N. Kabir, Editör, The Institution of Engineering and Technology (The IET), ss.153-180, 2019
23. Algoritmalara Giriş (Introduction to Algorithms kitabınının çevirisi)
PALME YAYINCILIK, Ankara, 2017
24. Şifrelerin Matematiği Kriptografi
ODTÜ Geliştirme Vakfı Yayıncılık, 2015
Metrikler
Yayın (WoS)
83
Yayın (Scopus)
100
Atıf (WoS)
392
H-İndeks (WoS)
10
Atıf (Scopus)
702
H-İndeks (Scopus)
13
Atıf (Scholar)
210
H-İndeks (Scholar)
6
Atıf (TrDizin)
16
H-İndeks (TrDizin)
2
Atıf (Sobiad)
7
H-İndeks (Sobiad)
1
Atıf (Diğer Toplam)
46
Proje
29
Fikri Mülkiyet
3
Tez Danışmanlığı
13