top of page

RESEARCH PAPERS

Authentication-enabled attribute-based access control for smart homes

Authors:

Date published:

Journal:

Melike Burakgazi Bilgen, Osman Abul, Kemal Bicakci

2022/12/16

International Journal of Information Security

Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper

Authors:

Date published:

Journal:

Kemal Bicakci, Yusuf Uzunay

2022/10/19

2022 15th International Conference on Information Security and Cryptography (ISCTURKEY)

Towards Zero Trust: The Design and Implementation of a Secure End-Point Device for Remote Working

Authors:

Date published:

Journal:

Kemal Bicakci, Yusuf Uzunay, Mansoor Khan

2021/12/2

2021 International Conference on Information Security and Cryptology (ISCTURKEY)

White-Box Implementations for Hash-Based Signatures and One-Time Passwords

Authors:

Date published:

Journal:

Kemal Bicakci, Kemal Ulker, Yusuf Uzunay, Halis Taha Şahin, Muhammed Said Gündoğan

2021

Cryptology ePrint Archive

Extending attribute-based access control model with authentication information for Internet of Things

Authors:

Date published:

Journal:

Melike Burakgazi Bilgen, Kemal Bicakci

2020/12/3

2020 International Conference on Information Security and Cryptology (ISCTURKEY)

Security analysis of mobile authenticator applications

Authors:

Date published:

Journal:

Can Ozkan, Kemal Bicakci

2020/12/3

2020 International Conference on Information Security and Cryptology (ISCTURKEY)

Analysis and evaluation of keystroke dynamics as a feature of contextual authentication

Authors:

Date published:

Journal:

Kemal Bicakci, Oguzhan Salman, Yusuf Uzunay, Mehmet Tan

2020/12/3

2020 International Conference on Information Security and Cryptology (ISCTURKEY)

Using attribute-based feature selection approaches and machine learning algorithms for detecting fraudulent Website URLs

Authors:

Date published:

Journal:

Mustafa Aydin, Ismail Butun, Kemal Bicakci, Nazife Baykal

2020/1/6

2020 10th Annual Computing and Communication Workshop and Conference (CCWC)

Open-TEE is No Longer Virtual: Towards Software-only Trusted Execution Environments Using White-box Cryptography

Authors:

Date published:

Journal:

Kemal Bicakci, Ihsan Kagan Ak, Betul Askin Ozdemir, Mesut Gozutok

2019/12/12

2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)

A quantitative CVSS-based cyber security risk assessment methodology for IT systems

Authors:

Date published:

Journal:

M Ugur Aksu, M Hadi Dilek, E İslam Tatlı, Kemal Bicakci, H Ibrahim Dirik, M Umut Demirezen, Tayfun Aykır

2017/10/23

2017 International Carnahan Conference on Security Technology (ICCST)

TwinCloud: secure cloud sharing without explicit key management

Authors:

Date published:

Journal:

Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan

2016/10/17

2016 IEEE Conference on Communications and Network Security (CNS)

Could we distinguish child users from adults using keystroke dynamics?

Authors:

Date published:

Journal:

Yasin Uzun, Kemal Bicakci, Yusuf Uzunay

2015/11/18

arXiv preprint arXiv:1511.05672

bottom of page