default search action
Kemal Bicakci
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Sahin, Muhammed Said Gündogan:
Quantum-Resistance Meets White-Box Cryptography: How to Implement Hash-Based Signatures against White-Box Attackers? IACR Commun. Cryptol. 1(2): 5 (2024) - [j28]Amin Mahnamfar, Kemal Bicakci, Yusuf Uzunay:
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems. Comput. Secur. 139: 103739 (2024) - [c41]Ali Dogan, Kemal Bicakci:
KAIME: Central Bank Digital Currency with Realistic and Modular Privacy. ICISSP 2024: 672-681 - [i12]Mustafa Cagal, Kemal Bicakci:
Evaluating the Usability of Qualified Electronic Signatures: Systematized Use Cases and Design Paradigms. CoRR abs/2408.14349 (2024) - 2023
- [j27]Melike Burakgazi Bilgen, Osman Abul, Kemal Bicakci:
Authentication-enabled attribute-based access control for smart homes. Int. J. Inf. Sec. 22(2): 479-495 (2023) - [i11]Amin Mahnamfar, Kemal Bicakci, Yusuf Uzunay:
ROSTAM: A Passwordless Web Single Sign-on Solution Mitigating Server Breaches and Integrating Credential Manager and Federated Identity Systems. CoRR abs/2310.05222 (2023) - [i10]Ali Dogan, Kemal Bicakci:
KAIME : Central Bank Digital Currency with Realistic and Modular Privacy. IACR Cryptol. ePrint Arch. 2023: 713 (2023) - 2022
- [i9]Abdullah Ozbay, Kemal Bicakci:
Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications. CoRR abs/2203.10583 (2022) - [i8]Kemal Bicakci, Yusuf Uzunay:
Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper. CoRR abs/2211.07161 (2022) - 2021
- [i7]Kemal Bicakci, Kemal Ulker, Yusuf Uzunay:
White-Box Implementations for Hash-Based Signatures and One-Time Passwords. IACR Cryptol. ePrint Arch. 2021: 968 (2021) - 2020
- [j26]Alvin Huseinovic, Sasa Mrdovic, Kemal Bicakci, Suleyman Uludag:
A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid. IEEE Access 8: 177447-177470 (2020) - [c40]Mustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal:
Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs. CCWC 2020: 774-779
2010 – 2019
- 2019
- [c39]Kemal Bicakci, Ihsan Kagan Ak, Betul Askin Özdemir, Mesut Gozutok:
Open-TEE is No Longer Virtual: Towards Software-Only Trusted Execution Environments Using White-Box Cryptography. TPS-ISA 2019: 177-183 - [i6]Mevlut Serkan Tok, Osman Tufan Tekin, Kemal Bicakci:
Analyzing Turkish F and Turkish E keyboard layouts using learning curves. CoRR abs/1905.11791 (2019) - 2018
- [j25]Huseyin Ugur Yildiz, Bekir Sait Ciftler, Bülent Tavli, Kemal Bicakci, Davut Incebacak:
The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks. IEEE Syst. J. 12(1): 1042-1046 (2018) - [c38]M. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli:
Automated Generation of Attack Graphs Using NVD. CODASPY 2018: 135-142 - [c37]Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay:
How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification. ISC 2018: 85-98 - 2017
- [j24]Hakan Ezgi Kiziloz, Kemal Bicakci:
A Closer Look at Pure-Text Human-Interaction Proofs. IEEE Trans. Hum. Mach. Syst. 47(6): 994-1004 (2017) - [c36]M. Ugur Aksu, M. Hadi Dilek, Emin Islam Tatli, Kemal Bicakci, H. Ibrahim Dirik, Mustafa Umut Demirezen, Tayfun Aykir:
A quantitative CVSS-based cyber security risk assessment methodology for IT systems. ICCST 2017: 1-8 - 2016
- [j23]Huseyin Ugur Yildiz, Kemal Bicakci, Bülent Tavli, Hakan Gultekin, Davut Incebacak:
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies. Ad Hoc Networks 37: 301-323 (2016) - [j22]Kemal Bicakci, Hakan Ezgi Kiziloz:
Leveraging human computation for pure-text Human Interaction Proofs. Int. J. Hum. Comput. Stud. 92-93: 44-54 (2016) - [c35]Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: Secure cloud sharing without explicit key management. CNS 2016: 581-585 - [i5]Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management. CoRR abs/1606.04705 (2016) - 2015
- [j21]Zeydin Pala, Kemal Bicakci, Mustafa Türk:
Effects of node mobility on energy balancing in wireless networks. Comput. Electr. Eng. 41: 314-324 (2015) - [j20]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Evaluating energy cost of route diversity for security in wireless sensor networks. Comput. Stand. Interfaces 39: 44-57 (2015) - [c34]Hakan Ezgi Kiziloz, Kemal Bicakci:
Towards making accessible human-interaction proofs more secure and usable. ISCC 2015: 607-612 - [i4]Yasin Uzun, Kemal Bicakci:
Could We Distinguish Child Users from Adults Using Keystroke Dynamics? CoRR abs/1511.05672 (2015) - [i3]Yusuf Uzunay, Kemal Bicakci:
Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication Proxies using Trusted Computing. CoRR abs/1511.05682 (2015) - 2014
- [j19]Erkam Uzun, Bülent Tavli, Kemal Bicakci, Davut Incebacak:
The impact of scalable routing on lifetime of smart grid communication networks. Ad Hoc Networks 22: 27-42 (2014) - [j18]Huseyin Cotuk, Kemal Bicakci, Bülent Tavli, Erkam Uzun:
The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks. IEEE Trans. Computers 63(11): 2866-2879 (2014) - [c33]Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier:
Mobile Authentication Secure Against Man-In-The-Middle Attacks. FNC/MobiSPC 2014: 323-329 - [c32]Kemal Bicakci, Devrim Unal, Nadir Ascioglu, Oktay Adalier:
Mobile Authentication Secure against Man-in-the-Middle Attacks. MobileCloud 2014: 273-276 - [c31]Kemal Bicakci, Tashtanbek Satiev:
charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication. PASSWORDS 2014: 74-86 - [c30]Huseyin Cotuk, Bülent Tavli, Kemal Bicakci, Mehmet Burak Akgun:
The impact of bandwidth constraints on the energy consumption of Wireless Sensor Networks. WCNC 2014: 2787-2792 - [c29]Huseyin Ugur Yildiz, Kemal Bicakci, Bülent Tavli:
Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies. WiSNet 2014: 49-51 - 2013
- [j17]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli, Zeydin Pala:
Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation. Comput. Stand. Interfaces 35(4): 396-402 (2013) - [j16]Davut Incebacak, Bülent Tavli, Kemal Bicakci, Aysegül Altin-Kayhan:
Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 252 (2013) - [j15]Kemal Bicakci, Bruno Crispo, Gabriele Oligeri:
LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload. ACM Trans. Internet Techn. 13(2): 5:1-5:27 (2013) - [c28]Murat Akpulat, Kemal Bicakci, Ugur Cil:
Revisiting graphical passwords for augmenting, not replacing, text passwords. ACSAC 2013: 119-128 - [c27]Arda Soylev, Kemal Bicakci, Bülent Tavli:
Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks. DCOSS 2013: 436-441 - [c26]Anil Ufuk Batmaz, Bülent Tavli, Davut Incebacak, Kemal Bicakci:
The impact of link unidirectionality and reverse path length on wireless sensor network lifetime. ICC 2013: 1795-1799 - [c25]Zeydin Pala, Kemal Bicakci, Bülent Tavli:
Mobility Helps Energy Balancing in Wireless Networks. MILCOM 2013: 293-298 - [c24]Anil Ufuk Batmaz, Bülent Tavli, Davut Incebacak, Kemal Bicakci:
Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks. SIU 2013: 1-4 - [c23]Erkam Uzun, Alper Aksaç, Orkun Ozturk, Hakan Ezgi Kiziloz, Davut Incebacak, Bülent Tavli, Kemal Bicakci:
Network lifetime maximization and localized routing tradeoff in wireless sensor networks. SIU 2013: 1-4 - 2012
- [j14]Yasin Uzun, Kemal Bicakci:
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset. Comput. Secur. 31(5): 717-726 (2012) - [j13]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli:
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures. Inf. Sci. 188: 44-63 (2012) - [j12]Bülent Tavli, Kemal Bicakci, Ruken Zilan, José M. Barceló-Ordinas:
A survey of visual sensor network platforms. Multim. Tools Appl. 60(3): 689-726 (2012) - [c22]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks. NTMS 2012: 1-5 - 2011
- [j11]Kemal Bicakci, Hakan Gultekin, Bülent Tavli, Ibrahim Ethem Bagci:
Maximizing lifetime of event-unobservable wireless sensor networks. Comput. Stand. Interfaces 33(4): 401-410 (2011) - [j10]Bülent Tavli, Mehmet Burak Akgun, Kemal Bicakci:
Impact of Limiting Number of Links on the Lifetime of Wireless Sensor Networks. IEEE Commun. Lett. 15(1): 43-45 (2011) - [j9]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli:
Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability. IEEE Commun. Lett. 15(2): 205-207 (2011) - [c21]Kemal Bicakci, Nart Bedin Atalay, Hakan Ezgi Kiziloz:
Johnny in internet café: user study and exploration of password autocomplete in web browsers. Digital Identity Management 2011: 33-42 - [c20]Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot:
Exploration and Field Study of a Password Manager Using Icon-Based Passwords. Financial Cryptography Workshops 2011: 104-118 - [c19]Kemal Bicakci, Paul C. van Oorschot:
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. NSPW 2011: 25-36 - 2010
- [j8]Kemal Bicakci, Bülent Tavli:
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks. Ad Hoc Networks 8(6): 582-596 (2010) - [j7]Bülent Tavli, M. Mikail Ozciloglu, Kemal Bicakci:
Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks. IEEE Commun. Lett. 14(12): 1104-1106 (2010) - [j6]Manel Guerrero Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bülent Tavli:
The future of security in Wireless Multimedia Sensor Networks - A position paper. Telecommun. Syst. 45(1): 77-91 (2010) - [c18]Seckin Anil Unlu, Kemal Bicakci:
NoTabNab: Protection against the "tabnabbing attack". eCrime 2010: 1-5 - [c17]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks. EMS 2010: 414-419
2000 – 2009
- 2009
- [j5]Kemal Bicakci, Bülent Tavli:
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 31(5): 931-941 (2009) - [j4]Kemal Bicakci, Hakan Gultekin, Bülent Tavli:
The impact of one-time energy costs on network lifetime in wireless sensor networks. IEEE Commun. Lett. 13(12): 905-907 (2009) - [c16]Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Hakan Gurbaslar, Burak Erdeniz:
Towards Usable Solutions to Graphical Password Hotspot Problem. COMPSAC (2) 2009: 318-323 - [c15]Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay:
Graphical Passwords as Browser Extension: Implementation and Usability Study. IFIPTM 2009: 15-29 - [c14]Kemal Bicakci:
Pushing the limits of one-time signatures. SIN 2009: 249-257 - [c13]Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay:
Graphical passwords as browser extension: implementation and usability study. SOUPS 2009 - 2008
- [i2]Kemal Bicakci:
Optimal Discretization for High-Entropy Graphical Passwords. IACR Cryptol. ePrint Arch. 2008: 178 (2008) - 2007
- [j3]Kemal Bicakci:
One-time proxy signatures revisited. Comput. Stand. Interfaces 29(4): 499-505 (2007) - 2006
- [c12]Chandana Gamage, Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Security for the Mythical Air-Dropped Sensor Network. ISCC 2006: 41-47 - [i1]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes. IACR Cryptol. ePrint Arch. 2006: 212 (2006) - 2005
- [j2]Kemal Bicakci, Nazife Baykal:
Improved server assisted signatures. Comput. Networks 47(3): 351-366 (2005) - [c11]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
Counting Abuses Using Flexible Off-line Credentials. ACISP 2005: 548-559 - [c10]Yusuf Uzunay, Kemal Bicakci:
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access. ICPADS (2) 2005: 245-249 - [c9]Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum:
How to incorporate revocation status information into the trust metrics for public-key certification. SAC 2005: 1594-1598 - 2004
- [c8]Kemal Bicakci, Nazife Baykal:
Server Assisted Signatures Revisited. CT-RSA 2004: 143-156 - [c7]Kemal Bicakci, Nazife Baykal:
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. EuroPKI 2004: 306-313 - [c6]Kemal Bicakci, Nazife Baykal:
EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology. MedInfo 2004: 1241-1245 - 2003
- [b1]Kemal Bicakci:
On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach ; Tanıma protokolleri, sayısal imzalar ve bunların e-sağlık uygulamalarının verimi üzerine: yukarıdan aşağıya bir yaklaşım. Middle East Technical University, Çankaya, Ankara, Turkey, 2003 - [j1]Kemal Bicakci, Gene Tsudik, Brian Tung:
How to construct optimal one-time signatures. Comput. Networks 43(3): 339-349 (2003) - [c5]Kemal Bicakci, Nazife Baykal:
Survivable Authentication for Health Information Systems. AMIA 2003 - [c4]Kemal Bicakci, Nazife Baykal:
Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol. ISCC 2003: 1239-1244 - [c3]Kemal Bicakci, Nazife Baykal:
One-Time Passwords: Security Analysis Using BAN Logic and Integrating with Smartcard Authentication. ISCIS 2003: 794-801 - [c2]Kemal Bicakci, Nazife Baykal:
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing. SPC 2003: 187-200 - 2002
- [c1]Kemal Bicakci, Nazife Baykal:
Infinite Length Hash Chains and Their Applications. WETICE 2002: 57-61
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint