| Issue Date | Title | Author(s) |
1 | May-2013 | Anonymity and one-way authentication in key exchange protocols | Goldberg, Ian; Stebila, Douglas; Ustaoğlu, Berkant |
2 | Aug-2011 | Integrating identity-based and certificate-based authenticated key exchange protocols | Ustaoğlu, Berkant |
3 | 2020 | Malleability and ownership of proxy signatures: Towards a stronger definiton and its limitations | Chatterjee, Sanjit; Ustaoğlu, Berkant |
4 | 2010 | Modeling leakage of ephemeral secrets in tripartite/group key exchange | Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
5 | Aug-2016 | A practical privacy-preserving targeted advertising scheme for IPTV users | Khayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant |
6 | 2012 | Privacy-preserving targeted advertising scheme for IPTV using the cloud | Khayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant ; Örencik, Cengiz |
7 | 2013 | Quantum key distribution in the classical authenticated key exchange framework | Mosca, Michele; Stebila, Douglas; Ustaoğlu, Berkant |
8 | 2012 | Sufficient condition for ephemeral key-leakage resilient tripartite key exchange | Fujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
9 | 2019 | Yürüme verisi ve konum mahremiyeti | Ustaoğlu, Berkant |