Author image not provided
 Kemal Bicakci

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.17
Citation Count146
Publication count35
Publication years2002-2016
Available for download6
Average downloads per article311.67
Downloads (cumulative)1,870
Downloads (12 Months)129
Downloads (6 Weeks)15
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


35 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 35
Result page: 1 2

Sort by:

1
August 2016 International Journal of Human-Computer Studies: Volume 92 Issue C, August 2016
Publisher: Academic Press, Inc.
Bibliometrics:
Citation Count: 0

Even though purely text-based Human Interaction Proofs (HIPs) have desirable usability and accessibility attributes; they could not overcome the security problems yet. Given the fact that fully automated techniques to generate pure-text HIPs securely do not exist, we propose leveraging human computation for this purpose. We design and implement a ...
Keywords: Human Interaction Proof, Human computation, Security, Usability, Accessibility, User study

2
February 2016 Ad Hoc Networks: Volume 37 Issue P2, February 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

In a typical Wireless Sensor Network (WSN) application, the basic communication service is the transportation of the data collected from sensors to the base station. For prolonging the network lifetime, energy efficiency should be one of the primary attributes of such a service. The amount of data transmitted by a ...
Keywords: Digital signature, Heuristic, Network lifetime, Energy efficiency, Wireless Sensor Networks, Mixed Integer Programming

3
July 2015 ISCC '15: Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC)
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Human-Interaction Proof (HIP) systems are widely used to prevent malicious acts of abusers. Legitimate users, however, are not satisfied with their ease of use. The response of Google to the complaints of difficulty in solving audio reCAPTCHAs was to introduce a much simpler version. But now we are back at ...

4
March 2015 Computer Standards & Interfaces: Volume 39 Issue C, March 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

Route diversity improves the security of Wireless Sensor Networks (WSNs) against adversaries attempting to obtain sensitive sensor data. By limiting the fraction of data relayed over each link and/or routed through each relay node, route diversity can be achieved, thus, extracting useful information from the network is rendered more challenging ...
Keywords: Eavesdropping and Node capture, Multi-path routing, Wireless sensor networks, Network lifetime, Network security

5
January 2015 Computers and Electrical Engineering: Volume 41 Issue C, January 2015
Publisher: Pergamon Press, Inc.
Bibliometrics:
Citation Count: 1

Display Omitted Utilizing mobility for energy balancing is the key insight of our work.We construct a Linear Programming (LP) framework that jointly captures data routing, mobility, and energy dissipation aspects.Mobility can improve the energy balancing up to a certain level.We delineate future research opportunities in the area. Having a direct ...

6
November 2014 IEEE Transactions on Computers: Volume 63 Issue 11, November 2014
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 8

Transmission power control has paramount importance in the design of energy-efficient wireless sensor networks (WSNs). In this paper, we systematically explore the effects of various transmission power control strategies on WSN lifetime with an emphasis on discretization of power levels and strategies for transmission power assignment. We investigate the effects ...

7
April 2014 MOBILECLOUD '14: Proceedings of the 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

Current mobile authentication solutions puts a cognitive burden on users to detect and avoid Man-In-The-Middle attacks. In this paper, we present a mobile authentication protocol named Mobile-ID which prevents Man-In-The-Middle attacks without relying on a human in the loop. With Mobile-ID, the message signed by the secure element on the ...
Keywords: authentication, phishing, Man-In-The-Middle attack, secure element, mobile signature, security protocol

8 published by ACM
December 2013 ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 42,   Downloads (Overall): 337

Full text available: PDFPDF
Users generally choose weak passwords which can be easily guessed. On the other hand, adoption of alternatives to text passwords has been slow due to cost and usability factors. We acknowledge that incumbent passwords remain difficult to beat and introduce in this study Type&Click (T&C), a hybrid scheme supporting text ...
Keywords: graphical passwords, authentication, passwords, usable security

9 published by ACM
December 2013 ACM Transactions on Internet Technology (TOIT): Volume 13 Issue 2, December 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 234

Full text available: PDFPDF
Server-side authenticated key-establishment protocols are characterized by placing a heavy workload on the server. We propose LAKE: a new protocol that enables amortizing servers’ workload peaks by moving most of the computational burden to the clients. We provide a formal analysis of the LAKE protocol under the Canetti-Krawczyk model and ...

10
June 2013 Computer Standards & Interfaces: Volume 35 Issue 4, June, 2013
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

In this paper we consider neighbor sensor networks which are defined as multiple wireless sensor networks under the administration of different authorities but located physically on the same area or close to each other. We construct a Linear Programming framework to characterize the cooperation of neighbor sensor networks in comparison ...
Keywords: Linear Programming, Wireless sensor networks, Network lifetime, Cooperation, Disjoint partition

11
May 2013 DCOSS '13: Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

It is well-known that in wireless sensor networks using minimum-energy paths to transfer data from sensor nodes to base station is not an energy-balancing option and not the optimal solution if lifetime, defined as the duration till the first node in the network exhausts all its energy, is of concern. ...
Keywords: Wireless sensor network, linear programming, network lifetime, routing, energy efficiency

12
October 2012 Multimedia Tools and Applications: Volume 60 Issue 3, October 2012
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 23

Recent developments in low-cost CMOS cameras have created the opportunity of bringing imaging capabilities to sensor networks. Various visual sensor platforms have been developed with the aim of integrating visual data to wireless sensor applications. The objective of this article is to survey current visual sensor platforms according to in-network ...
Keywords: Embedded systems, IEEE 802.11, System integration, Visual sensor networks, Embedded system interfaces, IEEE 802.15.4, Image acquisition, Vision platforms

13
July 2012 Computers and Security: Volume 31 Issue 5, July, 2012
Publisher: Elsevier Advanced Technology Publications
Bibliometrics:
Citation Count: 6

Keystroke Dynamics, which is a biometric characteristic that depends on typing style of users, could be a viable alternative or a complementary technique for user authentication if tolerable error rates are achieved. Most of the earlier studies on Keystroke Dynamics were conducted with irreproducible evaluation conditions therefore comparing their experimental ...
Keywords: Backpropagation, Biometrics, Verification, Keystroke dynamics, Neural networks

14
April 2012 Information Sciences: an International Journal: Volume 188, April, 2012
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 3

In the context of wireless sensor networks, computation/communication tradeoffs may appear in many aspects of the system design. In this paper, we present a linear programming framework to guide designers in effectively using these tradeoffs for prolonging network lifetime. To investigate the tradeoff in more concrete terms, as our representative ...
Keywords: Wireless sensor networks, Linear programming, Non-repudiation, Digital signature, Network lifetime

15 published by ACM
October 2011 DIM '11: Proceedings of the 7th ACM workshop on Digital identity management
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 19,   Downloads (Overall): 236

Full text available: PDFPDF
One of the most popular aids adopted by users to reduce the pain suffered from the use of passwords is browsers' autocomplete feature. This feature, caching username and password after getting the user consent and using them later for automatic completion, is available in all modern browsers but communication with ...
Keywords: usable security, user study, passwords

16 published by ACM
September 2011 NSPW '11: Proceedings of the 2011 New Security Paradigms Workshop
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 3,   Downloads (12 Months): 25,   Downloads (Overall): 404

Full text available: PDFPDF
Our agenda is two-fold. First, we introduce and give a technical description of gridWord, a novel knowledge-based authentication mechanism involving elements of both text and graphical passwords. It is intended to address a new research challenge arising from the evolution of Internet access devices, and which may arguably be viewed ...
Keywords: passwords, evaluation, science, usable security

17
June 2011 Computer Standards & Interfaces: Volume 33 Issue 4, June, 2011
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 5

In wireless sensor networks (WSNs) contextual information such as the information regarding whether, when, and where the data is collected cannot be protected using only traditional measures (e.g., encryption). Contextual information can be protected against global eavesdroppers by periodic packet transmission combined with dummy traffic filtering at proxy nodes. In ...
Keywords: Linear Programming, Wireless sensor networks, Privacy, Location privacy, Contextual privacy, Event-unobservability, Transactional confidentiality

18
February 2011 FC'11: Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

We carry out a hybrid lab and field study of a password manager program, and report on usability and security. Our study explores iPMAN, a browser-based password manager that in addition uses a graphical password scheme for the master password. We present our findings as a set of observations and ...
Keywords: field study, graphical passwords, password managers, security and usability

19
December 2010 IEEE Communications Letters: Volume 14 Issue 12, December 2010
Publisher: IEEE Press
Bibliometrics:
Citation Count: 9

Wireless sensor networks (WSNs) are used to obtain information from the surrounding areas and collected data is reported to the base station through wireless links. In certain scenarios ongoing transmissions within the network need to be concealed so that no information is leaked beyond a vulnerable area. Such a concealment ...
Keywords: linear programming, privacy, unobservability, wireless sensor networks, contextual privacy, energy efficiency

20
November 2010 EMS '10: Proceedings of the 2010 Fourth UKSim European Symposium on Computer Modeling and Simulation
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

In some wireless sensor network applications like precision agriculture, the network area is divided into a number of well-defined regions (spatial granules) and for each spatial granule a separate measurement is made. In performing the task of collecting the data pertaining to these measurements, there is an inherent tradeoff between ...
Keywords: Wireless Sensor Network, Linear Programming, Energy Requirement, Spatial Granularity, Redundancy



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us