Muhammed Ali Bingol
Muhammed Ali Bingol
Senior Lecturer in Cyber Security at De Montfort University
Bestätigte E-Mail-Adresse bei dmu.ac.uk
Titel
Zitiert von
Zitiert von
Jahr
A framework for analyzing RFID distance bounding protocols
G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin
Journal of Computer Security 19 (2), 289-317, 2011
1392011
Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography
G Avoine, MA Bingol, X Carpent, SB Yalcin
IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049, 2012
622012
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
International Workshop on Radio Frequency Identification: Security and …, 2011
592011
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
46*2018
Optimal security limits of RFID distance bounding protocols
O Kara, S Kardaş, MA Bingöl, G Avoine
International Workshop on Radio Frequency Identification: Security and …, 2010
312010
A new security and privacy framework for RFID in cloud computing
S Kardas, S Celik, MA Bingöl, A Levi
2013 IEEE 5th international conference on cloud computing technology and …, 2013
212013
Anonymous RFID authentication for cloud services
MA Bingol, F Birinci, S Kardaş, MS Kiraz
international journal of information security science 1 (2), 32-42, 2012
19*2012
An efficient 2-party private function evaluation protocol based on half gates
MA Bingöl, O Biçer, MS Kiraz, A Levi
The Computer Journal 62 (4), 598-613, 2019
142019
DKEM: Secure and efficient distributed key establishment protocol for wireless mesh networks
DK Altop, MA Bingöl, A Levi, E Savaş
Ad Hoc Networks 54, 53-68, 2017
122017
A formal framework for cryptanalyzing rfid distance bounding protocols
G Avoine, MA Bingol, S Kardas, C Lauradoux, B Martin
This work is partially funded by FP7-Project ICE under the grant agreement, 2009
112009
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingol, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing, 2020
8*2020
k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
S Kardaş, S Çelik, MA Bingöl, MS Kiraz, H Demirci, A Levi
Wireless Communications and Mobile Computing 15 (18), 2150-2166, 2015
52015
Deploying OSK on low-resource mobile devices
G Avoine, MA Bingöl, X Carpent, S Kardaş
International Workshop on Radio Frequency Identification: Security and …, 2013
52013
Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements
MA Bingol, F Birinci, S Kardas, MS Kiraz
International Conference BulCrypt, Sofia, Bulgaria, 2012
42012
Efficient and secure schemes for private function evaluation
MA Bingöl
32019
Attacks on a mutual authentication scheme conforming to EPCglobal Class-1 Generation-2 RFID systems
S Kardas, MA Bingöl
Proceedings of the 4th International Conference on Information Security and …, 2009
32009
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude
S Kardaş, MS Kiraz, MA Bingöl, F Birinci
Security and Communication Networks 9 (18), 5051-5063, 2016
22016
Security analysis of RFID authentication protocols based on symmetric cryptography and implementation of a forward private scheme
MA Bingöl
Institute of Science And Technology, 2012
22012
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
MA Kiraz, O Bicer, MA Bingol, A Levi
IEEE, 2020
2020
DKEM: Secure and efficient distributed key establishment protocol for wireless mesh networks
MA Bingol, D Karaoglan Altop, A Levi, E Savas
Elsevier, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20