Author image not provided
 Attila Altay Yavuz

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.81
Citation Count29
Publication count16
Publication years2006-2017
Available for download5
Average downloads per article189.80
Downloads (cumulative)949
Downloads (12 Months)288
Downloads (6 Weeks)39
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


16 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 16 of 16
Sort by:

1 published by ACM
November 2017 IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 18,   Downloads (12 Months): 60,   Downloads (Overall): 60

Full text available: PDFPDF
Internet of Things (IoT) is an integral part of application domains such as smart-home and digital healthcare. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and well-proven security, they also have been ...
Keywords: efficient implementations, internet of things, wireless network security, cryptographic optimizations

2 published by ACM
October 2017 CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 15,   Downloads (12 Months): 88,   Downloads (Overall): 88

Full text available: PDFPDF
Oblivious Random Access Machine (ORAM) enables a client to access her data without leaking her access patterns. Existing client-efficient ORAMs either achieve O(log N) client-server communication blowup without heavy computation, or O(1) blowup but with expensive homomorphic encryptions. It has been shown that O(log N) bandwidth blowup might not be ...
Keywords: privacy-enhancing technologies, secret sharing, oram, multi-party computation

3
February 2017 IEEE Transactions on Information Forensics and Security: Volume 12 Issue 2, February 2017
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users ( $\mathit {SU}$ s)’ sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users’ locations. It is ...

4 published by ACM
December 2016 ACSAC '16: Proceedings of the 32nd Annual Conference on Computer Security Applications
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 90,   Downloads (Overall): 126

Full text available: PDFPDF
Dynamic Searchable Symmetric Encryption (DSSE) allows a client to perform keyword searches over encrypted files via an encrypted data structure. Despite its merits, DSSE leaks search and update patterns when the client accesses the encrypted data structure. These leakages may create severe privacy problems as already shown, for example, in ...
Keywords: oblivious data structure, privacy in cloud computing, searchable encryption, ORAM, privacy enhancing technology

5
November 2015 Security and Communication Networks: Volume 8 Issue 17, November 2015
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 0

Audit logs provide information about historical states of computer systems. They also contain highly valuable data that can be used by law enforcement in forensic investigations. Thus, ensuring the authenticity and integrity of audit logs is of vital importance. An ideal security mechanism for audit logging must also satisfy security ...
Keywords: digital forensics, forward-secure, applied cryptography, secure audit logging, signature aggregation

6
August 2015 Revised Selected Papers of the 22nd International Conference on Selected Areas in Cryptography - SAC 2015 - Volume 9566
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Dynamic Searchable Symmetric Encryption DSSE enables a client to perform keyword queries and update operations on the encrypted file collections. DSSE has several important applications such as privacy-preserving data outsourcing for computing clouds. In this paper, we developed a new DSSE scheme that achieves the highest privacy among all compared ...
Keywords: Dynamic Searchable Symmetric Encryption, Secure data outsourcing, Privacy enhancing technologies, Secure computing clouds

7
October 2014 IEEE Transactions on Information Forensics and Security: Volume 9 Issue 10, October 2014
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1

Broadcast (multicast) authentication is crucial for large and distributed systems, such as cyber-physical infrastructures (e.g., power-grid/smart-grid) and wireless networks (e.g., intervehicle networks, military ad hoc networks). These time-critical systems require real-time authentication of command and control messages in a highly efficient, secure, and scalable manner. However, existing solutions are either ...

8
July 2013 DBSec'13: Proceedings of the 27th international conference on Data and Applications Security and Privacy XXVII
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Database outsourcing is a prominent trend that enables organizations to offload their data management overhead (e.g., query handling) to the external service providers. Immutable signatures are ideal tools to provide authentication and integrity for such applications with an important property called immutability. Signature immutability ensures that, no attacker can derive ...
Keywords: public key cryptography, immutable digital signatures, applied cryptography, distributed systems, outsourced databases

9
July 2013 DBSec 2013: Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy XXVII - Volume 7964
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Database outsourcing is a prominent trend that enables organizations to offload their data management overhead e.g., query handling to the external service providers. Immutable signatures are ideal tools to provide authentication and integrity for such applications with an important property called immutability. Signature immutability ensures that, no attacker can derive ...
Keywords: public key cryptography, Applied cryptography, immutable digital signatures, distributed systems, outsourced databases

10 published by ACM
April 2013 WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 172

Full text available: PDFPDF
Authentication and integrity are vital security services for wireless ubiquitous systems, which require various resource-constrained devices to operate securely and efficiently. Digital signatures are basic cryptographic tools to provide these security services. However, existing digital signatures are not practical for resource-constrained systems (e.g., wireless sensors, RFID-tags). That is, traditional signatures ...
Keywords: lightweight cryptography, broadcast authentication, applied cryptography, wireless network security

11
September 2012 Ad Hoc Networks: Volume 10 Issue 7, September, 2012
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 2

Unattended Wireless Sensor Networks (UWSNs) operating in hostile environments face great security and performance challenges due to the lack of continuous real-time communication with the final data receivers (e.g., mobile data collectors). The lack of real-time communication forces sensors to accumulate sensed data possibly for long time periods, along with ...
Keywords: Applied cryptography, Forward security, Aggregate signatures, Digital signatures, Unattended Wireless Sensor Networks (UWSNs)

12 published by ACM
July 2012 ACM Transactions on Information and System Security (TISSEC): Volume 15 Issue 2, July 2012
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 1,   Downloads (12 Months): 39,   Downloads (Overall): 503

Full text available: PDFPDF
Audit logs are an integral part of modern computer systems due to their forensic value. Protecting audit logs on a physically unprotected machine in hostile environments is a challenging task, especially in the presence of active adversaries. It is critical for such a system to have forward security and append-only ...
Keywords: Applied cryptography, forward security, digital signature, secure audit logging, signature aggregation

13
January 2011
Bibliometrics:
Citation Count: 0

Audit logs are a fundamental digital forensic mechanism for providing security in computer systems; they are used to keep track of important events regarding the system activities. In current large distributed systems, protecting audit logs is a challenging task, especially in the presence of active attackers. It is ...

14
December 2009 ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 15

Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on an untrusted machine in a large distributed system is a challenging task, especially in the presence of active adversaries. In such ...
Keywords: Applied cryptography, secure audit logging, digital forensics, forward security, signature aggregation

15
November 2006 ISCIS'06: Proceedings of the 21st international conference on Computer and Information Sciences
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Merkle Cryptosystem (MC) is the first cryptosystem which introduces general concept of the public key cryptography. In this paper, we propose Improved Merkle Cryptosystem (IMC), which has significant security advantages over both MC and a variant of MC (VMC). In IMC, cryptographic hash functions and a new puzzle structure are ...
Keywords: Merkle cryptosystem, cryptography, key establishment, encryption

16
November 2006 ISCIS'06: Proceedings of the 21st international conference on Computer and Information Sciences
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Mobile Ad-hoc networks (MANETs), providing infrastructure-free wireless instant communication, play important role in tactical military networks. However, providing security in tactical military MANETs, having very large and dynamic structure without infrastructure support in hostile environments, is a very difficult task. In order to address security problems in tactical military MANETs, ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us