Publications & Works

Published journal articles indexed by SCI, SSCI, and AHCI

A Closer Look at Pure-Text Human-Interaction Proofs

IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, vol.47, no.6, pp.994-1004, 2017 (Peer-Reviewed Journal) identifier identifier

Leveraging human computation for pure-text Human Interaction Proofs

INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, vol.92-93, pp.44-54, 2016 (Peer-Reviewed Journal) identifier identifier

Evaluating energy cost of route diversity for security in wireless sensor networks

COMPUTER STANDARDS & INTERFACES, vol.39, pp.44-57, 2015 (Peer-Reviewed Journal) Sustainable Development identifier identifier

Effects of node mobility on energy balancing in wireless networks

COMPUTERS & ELECTRICAL ENGINEERING, vol.41, pp.314-324, 2015 (Peer-Reviewed Journal) Sustainable Development identifier identifier

The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks

IEEE TRANSACTIONS ON COMPUTERS, vol.63, no.11, pp.2866-2879, 2014 (Peer-Reviewed Journal) Sustainable Development identifier identifier

LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload

ACM TRANSACTIONS ON INTERNET TECHNOLOGY, vol.13, no.2, 2013 (Peer-Reviewed Journal) identifier identifier

A survey of visual sensor network platforms

MULTIMEDIA TOOLS AND APPLICATIONS, vol.60, no.3, pp.689-726, 2012 (Peer-Reviewed Journal) identifier identifier

Maximizing lifetime of event-unobservable wireless sensor networks

COMPUTER STANDARDS & INTERFACES, vol.33, no.4, pp.401-410, 2011 (Peer-Reviewed Journal) identifier identifier

Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability

IEEE COMMUNICATIONS LETTERS, vol.15, no.2, pp.205-207, 2011 (Peer-Reviewed Journal) identifier identifier

Impact of Limiting Number of Links on the Lifetime of Wireless Sensor Networks

IEEE COMMUNICATIONS LETTERS, vol.15, no.1, pp.43-45, 2011 (Peer-Reviewed Journal) identifier identifier

The Impact of One-Time Energy Costs on Network Lifetime in Wireless Sensor Networks

IEEE COMMUNICATIONS LETTERS, vol.13, no.12, pp.905-907, 2009 (Peer-Reviewed Journal) identifier identifier

Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks

COMPUTER STANDARDS & INTERFACES, vol.31, no.5, pp.931-941, 2009 (Peer-Reviewed Journal) Sustainable Development identifier identifier

One-time proxy signatures revisited

COMPUTER STANDARDS & INTERFACES, vol.29, no.4, pp.499-505, 2007 (Peer-Reviewed Journal) identifier identifier

Improved server assisted signatures

COMPUTER NETWORKS, vol.47, no.3, pp.351-366, 2005 (Peer-Reviewed Journal) identifier identifier

SAOTS: A new efficient server assisted signature scheme for pervasive computing

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.2802, pp.187-200, 2004 (Peer-Reviewed Journal) identifier identifier

A new design of privilege management infrastructure with binding signature semantics

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.3093, pp.306-313, 2004 (Peer-Reviewed Journal) identifier

Server assisted signatures revisited

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.2964, pp.143-156, 2004 (Peer-Reviewed Journal) identifier

Improving the Security and Flexibility of One-Time Passwords by Signature Chains

Turkish Journal of Electrical Engineering and Computer Sciences, vol.11, no.3, pp.223-236, 2003 (Peer-Reviewed Journal) identifier

How to construct optimal one-time signatures

COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, vol.43, no.3, pp.339-349, 2003 (Peer-Reviewed Journal) Creative Commons License identifier identifier

One-time passwords: Security analysis using BAN logic and integrating with smartcard authentication

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol.2869, pp.794-801, 2003 (Peer-Reviewed Journal) identifier

Articles Published in Other Journals

Survivable authentication for health information systems.

AMIA ... Annual Symposium proceedings / AMIA Symposium. AMIA Symposium, pp.791, 2003 (Peer-Reviewed Journal) identifier identifier

Refereed Congress / Symposium Publications in Proceedings

Using Attribute-based Feature Selection Approaches and Machine Learning Algorithms for Detecting Fraudulent Website URLs

10th Annual Computing and Communication Workshop and Conference (CCWC), California, United States Of America, 6 - 08 January 2020, pp.774-779 identifier identifier

Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 December 2020, pp.48-55 identifier identifier

Security Analysis of Mobile Authenticator Applications

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 December 2020, pp.18-30 identifier identifier

Analysis and Evaluation of Keystroke Dynamics as a Feature of Contextual Authentication

International Conference on Information Security and Cryptology (ISCTURKEY), ELECTR NETWORK, 3 - 04 December 2020, pp.11-17 identifier identifier

Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography

1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (IEEE TPS-ISA), Los-Angeles, Chile, 12 - 14 December 2019, pp.177-183 identifier identifier

How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification

21st International Information Security Conference (ISC), Guildford, United Kingdom, 9 - 12 September 2018, vol.11060, pp.85-98 identifier identifier

Automated Generation of Attack Graphs Using NVD

8th ACM Conference on Data and Application Security and Privacy (CODASPY), Arizona, United States Of America, 19 - 21 March 2018, pp.135-142 identifier identifier

A quantitative CVSS-based cyber security risk assessment methodology for IT systems

2017 International Carnahan Conference on Security Technology, ICCST 2017, Madrid, Spain, 23 - 26 October 2017, vol.2017-October, pp.1-8 identifier

TwinCloud: Secure Cloud Sharing Without Explicit Key Management

IEEE Conference on Communications and Network Security (CNS), Pennsylvania, United States Of America, 17 - 19 October 2016, pp.581-585 identifier

Towards Making Accessible Human-Interaction Proofs More Secure and Usable

IEEE Symposium on Computers and Communication (ISCC), Larnaka, Cyprus (Gkry), 6 - 09 July 2015, pp.607-612 identifier

charPattern: Rethinking Android Lock Pattern to Adapt to Remote Authentication

International Conference on Passwords (PASSWORDS), Trondheim, Norway, 8 - 10 December 2014, vol.9393, pp.74-86 identifier identifier

The Impact of Bandwidth Constraints on the Energy Consumption of Wireless Sensor Networks

IEEE Wireless Communications and Networking Conference (WCNC), İstanbul, Turkey, 6 - 09 April 2014, pp.2787-2792 Sustainable Development identifier identifier

Mobile authentication secure against man-in-the-middle attacks

2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014, Oxford, United Kingdom, 7 - 10 April 2014, pp.273-276 identifier

Mobile Authentication Secure Against Man-In-The-Middle Attacks

11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC), Niagara Falls, Canada, 17 - 20 August 2014, vol.34, pp.323-329 identifier identifier

Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies

2014 IEEE Topical Conference on Wireless Sensors and Sensor Networks, WiSNet 2014, Newport Beach, CA, United States Of America, 19 - 22 January 2014, pp.49-51 Sustainable Development identifier

Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing

5th International Conference on Intelligent Systems, Modelling and Simulation (ISMS), Langkawi, Malaysia, 27 - 29 January 2014, pp.534-539 identifier identifier

Revisiting graphical passwords for augmenting, not replacing, text passwords

29th Annual Computer Security Applications Conference, ACSAC 2013, New Orleans, LA, United States Of America, 9 - 13 December 2013, pp.119-128 identifier

The Impact of Link Unidirectionality and Reverse Path Length on Wireless Sensor Network Lifetime

IEEE International Conference on Communications (ICC), Budapest, Hungary, 9 - 13 June 2013, pp.1795-1796 identifier identifier

Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks

9th IEEE International Conference on Distributed Computing in Sensor Systems (DCoSS), Cambridge, Canada, 21 - 23 May 2013, pp.436-441 identifier identifier

Mobility Helps Energy Balancing in Wireless Networks

IEEE Military Communications Conference, California, United States Of America, 18 - 20 November 2013, pp.293-298 Sustainable Development identifier identifier

Energy cost of mitigating physical attacks in wireless sensor networks

2012 5th International Conference on New Technologies, Mobility and Security, NTMS 2012, İstanbul, Turkey, 7 - 10 May 2012 identifier

Exploration and field study of a password manager using icon-based passwords

15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, 28 February - 04 March 2011, vol.7126 LNCS, pp.104-118 identifier

A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation

2011 New Security Paradigms Workshop, NSPW'11, Marin County, CA, United States Of America, 12 - 15 September 2011, pp.25-36 Creative Commons License identifier

Johnny in Internet café: User study and exploration of password autocomplete in web browsers

7th ACM Workshop on Digital Identity Management, DIM'11 - Co-located with 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, IL, United States Of America, 21 October 2011, pp.33-42 Sustainable Development identifier

NoTabNab: Protection against the "tabnabbing attack"

2010 Fall General Meeting and eCrime Researchers Summit, eCrime 2010, Dallas, TX, United States Of America, 18 - 20 October 2010 identifier

Investigating the tradeoffs between spatial granularity and energy requirements in wireless sensor networks

UKSim 4th European Modelling Symposium on Computer Modelling and Simulation, EMS2010, Pisa, Italy, 17 - 19 November 2010, pp.414-419 identifier

Towards usable solutions to graphical password hotspot problem

2009 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, WA, United States Of America, 20 - 24 July 2009, vol.2, pp.318-323 identifier

Pushing the limits of one-time signatures

2nd International Conference on Security of Information and Networks, SIN'09, Famagusta, Cyprus (Gkry), 6 - 10 October 2009, pp.249-257 identifier

Graphical passwords as browser extension: Implementation and usability study

3rd IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2009, Indiana, United States Of America, 15 - 19 June 2009, vol.300, pp.15-29 Creative Commons License identifier

Optimal discretization for high-entropy graphical passwords

2008 23rd International Symposium on Computer and Information Sciences, ISCIS 2008, İstanbul, Turkey, 27 - 29 October 2008 Creative Commons License identifier

SHA: A secure voice activated smart home for quadriplegia patients

IEEE International Conference on Bioinformatics and Biomedicine, California, United States Of America, 2 - 04 November 2007, pp.151-152 Sustainable Development identifier identifier

Security for the mythical air-dropped sensor network

11th IEEE Symposium on Computers and Communications, ISCC 2006, Cagliari, Italy, 26 - 29 June 2006, pp.41-47 identifier

One-time sensors: A novel concept to mitigate node-capture attacks

Second European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2005, Visegrad, Hungary, 13 - 14 July 2005, vol.3813 LNCS, pp.80-90 identifier

UNIDES: An efficient real-time system to detect and block unauthorized Internet access

11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005, Fukuoka, Japan, 20 - 22 July 2005, vol.2, pp.245-249 identifier

A cost-efficient counter-intrusion scheme for one-time sensor networks

2005 Intelligent Sensors, Sensor Networks and Information Processing Conference, Melbourne, Australia, 5 - 08 December 2005, vol.2005, pp.45-50 Sustainable Development identifier

How to incorporate revocation status information into the trust metrics for public-key certification

20th Annual ACM Symposium on Applied Computing, Santa Fe, NM, United States Of America, 13 - 17 March 2005, vol.2, pp.1594-1598 identifier

Counting abuses using flexible off-line credentials

10th Australasian Conference on Information Security and Privacy, ACISP 2005, Brisbane, Australia, 4 - 06 July 2005, vol.3574, pp.548-559 identifier

Design and performance evaluation of a flexible and efficient server assisted signature protocol

8th IEEE International Symposium on Computers and Communication (ISCC 2003), Antalya, Turkey, 30 June - 03 July 2003, pp.1239-1244 identifier identifier

Infinite length hash chains and their applications

11th IEEE International Workshop on Enabling Technologies - Infrastructure for Collaborative Enterprises (WET ICE 2002), Pennsylvania, United States Of America, 10 - 12 June 2002, pp.57-61 identifier identifier