Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Berkant
    Last name: Ustaoglu
    DBLP: 73/5050
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    A Generic Variant of NIST's KAS2 Key Agreement Protocol.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Leyli Javid Khayati, Cengiz Örencik, Erkay Savas, Berkant Ustaoglu.
    A practical privacy-preserving targeted advertising scheme for IPTV users.
    Int. J. Inf. Sec. 2016, Volume 15 (0) 2016
    Conference paper
    Ian Goldberg, Douglas Stebila, Berkant Ustaoglu.
    Anonymity and one-way authentication in key exchange protocols.
    Des. Codes Cryptography 2013, Volume 67 (0) 2013
    Conference paper
    Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu.
    Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.
    Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Berkant Ustaoglu.
    Comparing
    Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Berkant Ustaoglu.
    Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version).
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the pre- and post-specified peer models for key agreement.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the Pre- and Post-specified Peer Models for Key Agreement.
    Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Jiang Wu, Berkant Ustaoglu.
    Efficient Key Exchange with Tight Security Reduction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Show item 1 to 10 of 30  

    Your query returned 30 matches in the database.