Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu.
    A practical privacy-preserving targeted advertising scheme for IPTV users.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Journal article
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Ian Goldberg, Douglas Stebila, Berkant Ustaoglu.
    Anonymity and one-way authentication in key exchange protocols.
    Des. Codes Cryptography 2013, Volume 67 (0) 2013
    Conference paper
    Michele Mosca, Douglas Stebila, Berkant Ustaoglu.
    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
    Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Journal article
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik.
    Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Michele Mosca, Douglas Stebila, Berkant Ustaoglu.
    Quantum Key Distribution in the Classical Authenticated Key Exchange Framework.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    A Generic Variant of NIST's KAS2 Key Agreement Protocol.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Show item 1 to 10 of 30  

    Your query returned 30 matches in the database.