Browsing by Author "125410"

Sort by: Order: Results:

  • Ak, Murat; Pehlivanoglu, Serdar; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
    A broadcast encryption (BE) scheme is a method for encrypting messages in a way that only a set of privileged users can decrypt it. Anonymity in a BE system is to hide any information on the privileged set. This problem ...
  • Ashouri-Talouki, Maede; Baraani-Dastjerdi, Ahmad; Selçuk, Ali Aydın (Springer London ltd., 2015-12)
    Several techniques have been recently proposed to protect user location privacy while accessing location-based services (LBSs). However, applying these techniques to protect location privacy for a group of users would lead ...
  • Ersoy, Oguzhan; Pedersen, Thomas Brochmann; Kaya, Kamer; Selçuk, Ali Aydın; Anarim, Emin (Wiley-blackwell, 2016-11-25)
    For commitments on secrets, statistical hiding is a must when we are dealing with a long-term secret or when the secret domain is small enough for a brute-force attack by a powerful adversary. Unfortunately, all the Chinese ...
  • Balli, Muhammed Faith; Uludağ, Süleyman; Selçuk, Ali Aydın; Tavlı, Bülent (Institute of Electrical and Electronics Engineers Inc., 2018-09)
    The stringent requirement of the demand-supply equilibrium for delivering electricity has traditionally been dealt with a supply-side perspective, assuming that the demand is not alterable. With the promises of the smart ...
  • Akman, Gamze; Selçuk, Ali Aydın ( IEEE, 2018)
    oday, the increasing popularity of instant messaging applications has introduced some security measures. One of these security measures is the authentication activity that users need to make. Authentication in instant ...
  • Tezcan, Cihangir; Selçuk, Ali Aydın (Elsevier, 2016-02)
    Improbable differential cryptanalysis is a recent attack technique that generalizes impossible differential cryptanalysis for block ciphers. In this paper, we give the most effective attacks known to date on the CLEFIA ...
  • Ak, Murat; Hanoymak, Turgut; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
    In 1993, Zheng and Seberry proposed three methods for strengthening public key cryptosystems. These methods aimed to obtain schemes that are secure against adaptively chosen ciphertext attacks. One method was improving ...
  • Selçuk, Ali Aydın; Orhan, Fatih; Batur, Berker (2018)
    Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, ...
  • Uludag, Suleyman; Balli, Muhammed Fatih; Selçuk, Ali Aydın; Tavlı, Bülent (IEEE, 2015)
    One of the the most propitious enablers of the Smart Grid paradigm, and a rather low-hanging fruit, is Demand Response (DR) programs. DR is a set of courses of actions to reach and maintain the supply-demand equilibrium ...
  • Ak, Murat; Selçuk, Ali Aydın (Elsevier, 2015-06-01)
    In Broadcast Encryption (BE) schemes, the problem is to encrypt a content for a group of dynamically changing privileged (subscriber) subset within a receiver population. A popular approach is to carefully distribute a ...
  • Yüce, Emre; Selçuk, Ali Aydın (Institution of Engineering and Technology, 2018-09-01)
    Secure socket layer/transport layer security (TLS) is the de facto protocol for providing secure communications over the Internet. It relies on the web PKI model for authentication and secure key exchange. Despite its ...
  • Kaya, Kamer; Selçuk, Ali Aydın (Elsevier, 2014-03-15)
    In this paper, we propose a new threshold scheme for the Digital Signature Standard (DSS) using Asmuth Bloom secret sharing based on the Chinese Remainder Theorem (CRT). To achieve the desired result, we first show how to ...
  • Selçuk, Ali Aydın; Orhan, Fatih; Batur, Berker (IEEE, 2017)
    Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, ...