Issue Date | Title | Author(s) |
May-2013 | Anonymity and One-Way Authentication in Key Exchange Protocols | Goldberg, Ian; Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Comparing Sessionstatereveal and Ephemeralkeyreveal for Diffie-Hellman Protocols (extended Version) | Ustaoğlu, Berkant |
2008 | Comparing the Pre- and Post-Specified Peer Models for Key Agreement | Menezes, Alfred; Ustaoğlu, Berkant |
2009 | Efficient Key Exchange With Tight Security Reduction | Wu, Jiang; Ustaoğlu, Berkant |
Aug-2011 | Integrating Identity-Based and Certificate-Based Authenticated Key Exchange Protocols | Ustaoğlu, Berkant |
2020 | Malleability and Ownership of Proxy Signatures: Towards a Stronger Definiton and Its Limitations | Chatterjee, Sanjit; Ustaoğlu, Berkant |
2010 | Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange | Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
2009 | Multi-Party Off-The Messaging | Goldberg, Ian; Ustaoğlu, Berkant ; Van Gundy, Matthew D.; Chen, Hao |
2009 | Obtaining a Secure and Efficient Key Agreement Protocol From (h)mqv and Naxos (extended Version) | Ustaoğlu, Berkant |
2006 | On the Importance of Public-Key Validation in the Mqv and Hmqv Key Agreement Protocols | Menezes, Alfred; Ustaoğlu, Berkant |
Aug-2016 | A Practical Privacy-Preserving Targeted Advertising Scheme for Iptv Users | Khayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant |
2012 | Privacy-Preserving Targeted Advertising Scheme for Iptv Using the Cloud | Khayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant ; Örencik, Cengiz |
2013 | Quantum Key Distribution in the Classical Authenticated Key Exchange Framework | Mosca, Michele; Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Reusing Static Keys in Key Agreement Protocols | Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant |
2008 | Security Arguments for the Um Key Agreement Protocol in the Nist Sp 800-56a Standard | Menezes, Alfred; Ustaoğlu, Berkant |
2009 | Strongly Secure Authenticated Key Exchange Without Naxos' Approach | Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant |
2012 | Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange | Fujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
2009 | Towards Denial-Of Key Agreement Protocols | Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Utilizing Postponed Ephemeral and Pseudo-Static Keys in Tripartite and Identity-Based Key Agreement Protocols | Fujioka, Atsushi; Suzuki, Koutarou; Ustaoğlu, Berkant |
2019 | Yürüme verisi ve konum mahremiyeti | Ustaoğlu, Berkant |