Now showing items 1-12 of 12

    • Function and secret sharing extensions for Blakley and Asmuth-Bloom secret sharing schemes 

      Bozkurt, İlker Nadi (Bilkent University, 2009)
      Threshold cryptography deals with situations where the authority to initiate or perform cryptographic operations is distributed amongst a group of individuals. Usually in these situations a secret sharing scheme is used ...
    • Generalized ID-based elgamal signatures and extensions 

      Kalkan, Said (Bilkent University, 2008)
      ID-based cryptography helps us to simplify key management process in traditional public key infrastructures. Any public information such as the e-mail address, name, etc., can be used as a public key and this solves the ...
    • Generating content-based signatures for detecting bot-infected machines 

      Bilge, Leyla (Bilkent University, 2008)
      A botnet is a network of compromised machines that are remotely controlled and commanded by an attacker, who is often called the botmaster. Such botnets are often abused as platforms to launch distributed denial of service ...
    • Guap-A strong user authentication protocol for GSM 

      Aydemir, Özer (Bilkent University, 2005)
      Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings limitations and restrictions on the functionality of the ...
    • Immunizing binary executables against return-oriented programming 

      Onarlıoğlu, Kaan (Bilkent University, 2010)
      Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security ...
    • Insights into user behavior in dealing with common Internet attacks 

      Yılmaz, Utku Ozan (Bilkent University, 2011)
      The Internet’s immense popularity has made it an attractive medium for attackers. Today, criminals often make illegal profits by targeting Internet users. Most common Internet attacks require some form of user interaction ...
    • OpenID with certificate-based user authentication on smartcard 

      Kişin, Bahar Berna (Bilkent University, 2013)
      From the point of its users, federated identity systems provide great convenience to log in to varied web sites without bothering of registration in advance. Looking from a vantage point, federated identity management ...
    • Optimal broadcasting encryption with free riders 

      Ak, Murat (Bilkent University, 2006)
      Broadcast encryption schemes allow a center to broadcast encrypted messages so that each particular message can only be decrypted by a set of privileged receivers designated for it. The standard technique is to distribute ...
    • Optimization techniques and new methods for boradcast encryption and traitor tracing schemes 

      Ak, Murat (Bilkent University, 2012)
      In the last few decades, the use of digital content increased dramatically. Many forms of digital products in the form of CDs, DVDs, TV broadcasts, data over the Internet, entered our life. Classical cryptography, where ...
    • Random delay techniques for location privacy in VANETs 

      Albakır Çatal, Satiye (Bilkent University, 2013)
      Vehicular ad hoc network (VANET) is an emerging new communication technology which has attracted a lot of research attention from academic community and industry. It is promising technology to provide safer and efficient ...
    • Stealth sandbox analysis of malware 

      Uğurlu, Ömer Sezgin (Bilkent University, 2009)
      Malware is one of the biggest problems of the world of bits and bytes. Generally malware does activities a user normally does not do, such as becoming part of a virtual army or submitting confidential data of the user ...
    • Threshold cryptography with Chinese remainder theorem 

      Kaya, Kamer (Bilkent University, 2009)
      Information security has become much more important since electronic communication is started to be used in our daily life. The content of the term information security varies according to the type and the requirements ...