Остановите войну!
for scientists:
default search action
Kemal Bicakci
- > Home > Persons > Kemal Bicakci
Publications
- 2023
- [j27]Melike Burakgazi Bilgen, Osman Abul, Kemal Bicakci:
Authentication-enabled attribute-based access control for smart homes. Int. J. Inf. Sec. 22(2): 479-495 (2023) - [i11]Amin Mahnamfar, Kemal Bicakci, Yusuf Uzunay:
ROSTAM: A Passwordless Web Single Sign-on Solution Mitigating Server Breaches and Integrating Credential Manager and Federated Identity Systems. CoRR abs/2310.05222 (2023) - 2022
- [i8]Kemal Bicakci, Yusuf Uzunay:
Is FIDO2 Passwordless Authentication a Hype or for Real?: A Position Paper. CoRR abs/2211.07161 (2022) - 2021
- [i7]Kemal Bicakci, Kemal Ulker, Yusuf Uzunay:
White-Box Implementations for Hash-Based Signatures and One-Time Passwords. IACR Cryptol. ePrint Arch. 2021: 968 (2021) - 2020
- [j26]Alvin Huseinovic, Sasa Mrdovic, Kemal Bicakci, Suleyman Uludag:
A Survey of Denial-of-Service Attacks and Solutions in the Smart Grid. IEEE Access 8: 177447-177470 (2020) - 2018
- [j25]Huseyin Ugur Yildiz, Bekir Sait Ciftler, Bülent Tavli, Kemal Bicakci, Davut Incebacak:
The Impact of Incomplete Secure Connectivity on the Lifetime of Wireless Sensor Networks. IEEE Syst. J. 12(1): 1042-1046 (2018) - [c38]M. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli:
Automated Generation of Attack Graphs Using NVD. CODASPY 2018: 135-142 - [c37]Kemal Bicakci, Enes Altuncu, Muhammet Sakir Sahkulubey, Hakan Ezgi Kiziloz, Yusuf Uzunay:
How Safe Is Safety Number? A User Study on SIGNAL's Fingerprint and Safety Number Methods for Public Key Verification. ISC 2018: 85-98 - 2017
- [j24]Hakan Ezgi Kiziloz, Kemal Bicakci:
A Closer Look at Pure-Text Human-Interaction Proofs. IEEE Trans. Hum. Mach. Syst. 47(6): 994-1004 (2017) - [c36]M. Ugur Aksu, M. Hadi Dilek, Emin Islam Tatli, Kemal Bicakci, H. Ibrahim Dirik, Mustafa Umut Demirezen, Tayfun Aykir:
A quantitative CVSS-based cyber security risk assessment methodology for IT systems. ICCST 2017: 1-8 - 2016
- [j23]Huseyin Ugur Yildiz, Kemal Bicakci, Bülent Tavli, Hakan Gultekin, Davut Incebacak:
Maximizing Wireless Sensor Network lifetime by communication/computation energy optimization of non-repudiation security service: Node level versus network level strategies. Ad Hoc Networks 37: 301-323 (2016) - [j22]Kemal Bicakci, Hakan Ezgi Kiziloz:
Leveraging human computation for pure-text Human Interaction Proofs. Int. J. Hum. Comput. Stud. 92-93: 44-54 (2016) - [c35]Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: Secure cloud sharing without explicit key management. CNS 2016: 581-585 - [i5]Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan:
TwinCloud: A Client-Side Encryption Solution for Secure Sharing on Clouds Without Explicit Key Management. CoRR abs/1606.04705 (2016) - 2015
- [j21]Zeydin Pala, Kemal Bicakci, Mustafa Türk:
Effects of node mobility on energy balancing in wireless networks. Comput. Electr. Eng. 41: 314-324 (2015) - [j20]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Evaluating energy cost of route diversity for security in wireless sensor networks. Comput. Stand. Interfaces 39: 44-57 (2015) - [c34]Hakan Ezgi Kiziloz, Kemal Bicakci:
Towards making accessible human-interaction proofs more secure and usable. ISCC 2015: 607-612 - [i3]Yusuf Uzunay, Kemal Bicakci:
Trust-in-the-Middle: Towards Establishing Trustworthiness of Authentication Proxies using Trusted Computing. CoRR abs/1511.05682 (2015) - 2014
- [j19]Erkam Uzun, Bülent Tavli, Kemal Bicakci, Davut Incebacak:
The impact of scalable routing on lifetime of smart grid communication networks. Ad Hoc Networks 22: 27-42 (2014) - [j18]Huseyin Cotuk, Kemal Bicakci, Bülent Tavli, Erkam Uzun:
The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks. IEEE Trans. Computers 63(11): 2866-2879 (2014) - [c30]Huseyin Cotuk, Bülent Tavli, Kemal Bicakci, Mehmet Burak Akgun:
The impact of bandwidth constraints on the energy consumption of Wireless Sensor Networks. WCNC 2014: 2787-2792 - [c29]Huseyin Ugur Yildiz, Kemal Bicakci, Bülent Tavli:
Communication/computation trade-offs in wireless sensor networks: Comparing network-level and node-level strategies. WiSNet 2014: 49-51 - 2013
- [j17]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli, Zeydin Pala:
Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation. Comput. Stand. Interfaces 35(4): 396-402 (2013) - [j16]Davut Incebacak, Bülent Tavli, Kemal Bicakci, Aysegül Altin-Kayhan:
Optimal number of routing paths in multi-path routing to minimize energy consumption in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 252 (2013) - [c27]Arda Soylev, Kemal Bicakci, Bülent Tavli:
Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks. DCOSS 2013: 436-441 - [c26]Anil Ufuk Batmaz, Bülent Tavli, Davut Incebacak, Kemal Bicakci:
The impact of link unidirectionality and reverse path length on wireless sensor network lifetime. ICC 2013: 1795-1799 - [c25]Zeydin Pala, Kemal Bicakci, Bülent Tavli:
Mobility Helps Energy Balancing in Wireless Networks. MILCOM 2013: 293-298 - [c24]Anil Ufuk Batmaz, Bülent Tavli, Davut Incebacak, Kemal Bicakci:
Effects of handshake hop length of unidirectional links on the lifetime of wireless sensor networks. SIU 2013: 1-4 - [c23]Erkam Uzun, Alper Aksaç, Orkun Ozturk, Hakan Ezgi Kiziloz, Davut Incebacak, Bülent Tavli, Kemal Bicakci:
Network lifetime maximization and localized routing tradeoff in wireless sensor networks. SIU 2013: 1-4 - 2012
- [j13]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli:
Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures. Inf. Sci. 188: 44-63 (2012) - [j12]Bülent Tavli, Kemal Bicakci, Ruken Zilan, José M. Barceló-Ordinas:
A survey of visual sensor network platforms. Multim. Tools Appl. 60(3): 689-726 (2012) - [c22]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks. NTMS 2012: 1-5 - 2011
- [j11]Kemal Bicakci, Hakan Gultekin, Bülent Tavli, Ibrahim Ethem Bagci:
Maximizing lifetime of event-unobservable wireless sensor networks. Comput. Stand. Interfaces 33(4): 401-410 (2011) - [j10]Bülent Tavli, Mehmet Burak Akgun, Kemal Bicakci:
Impact of Limiting Number of Links on the Lifetime of Wireless Sensor Networks. IEEE Commun. Lett. 15(1): 43-45 (2011) - [j9]Kemal Bicakci, Ibrahim Ethem Bagci, Bülent Tavli:
Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability. IEEE Commun. Lett. 15(2): 205-207 (2011) - [c21]Kemal Bicakci, Nart Bedin Atalay, Hakan Ezgi Kiziloz:
Johnny in internet café: user study and exploration of password autocomplete in web browsers. Digital Identity Management 2011: 33-42 - [c20]Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot:
Exploration and Field Study of a Password Manager Using Icon-Based Passwords. Financial Cryptography Workshops 2011: 104-118 - [c19]Kemal Bicakci, Paul C. van Oorschot:
A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. NSPW 2011: 25-36 - 2010
- [j8]Kemal Bicakci, Bülent Tavli:
Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks. Ad Hoc Networks 8(6): 582-596 (2010) - [j7]Bülent Tavli, M. Mikail Ozciloglu, Kemal Bicakci:
Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks. IEEE Commun. Lett. 14(12): 1104-1106 (2010) - [j6]Manel Guerrero Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bülent Tavli:
The future of security in Wireless Multimedia Sensor Networks - A position paper. Telecommun. Syst. 45(1): 77-91 (2010) - [c17]Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks. EMS 2010: 414-419 - 2009
- [j5]Kemal Bicakci, Bülent Tavli:
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stand. Interfaces 31(5): 931-941 (2009) - [j4]Kemal Bicakci, Hakan Gultekin, Bülent Tavli:
The impact of one-time energy costs on network lifetime in wireless sensor networks. IEEE Commun. Lett. 13(12): 905-907 (2009) - [c16]Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Hakan Gurbaslar, Burak Erdeniz:
Towards Usable Solutions to Graphical Password Hotspot Problem. COMPSAC (2) 2009: 318-323 - [c15]Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay:
Graphical Passwords as Browser Extension: Implementation and Usability Study. IFIPTM 2009: 15-29 - [c13]Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay:
Graphical passwords as browser extension: implementation and usability study. SOUPS 2009 - 2005
- [c10]Yusuf Uzunay, Kemal Bicakci:
UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access. ICPADS (2) 2005: 245-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-18 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint