Issue Date | Title | Author(s) |
May-2013 | Anonymity and one-way authentication in key exchange protocols | Goldberg, Ian; Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version) | Ustaoğlu, Berkant |
2008 | Comparing the pre- and post-specified peer models for key agreement | Menezes, Alfred; Ustaoğlu, Berkant |
2009 | Efficient key exchange with tight security reduction | Wu, Jiang; Ustaoğlu, Berkant |
Aug-2011 | Integrating identity-based and certificate-based authenticated key exchange protocols | Ustaoğlu, Berkant |
2020 | Malleability and ownership of proxy signatures: Towards a stronger definiton and its limitations | Chatterjee, Sanjit; Ustaoğlu, Berkant |
2010 | Modeling leakage of ephemeral secrets in tripartite/group key exchange | Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
2009 | Multi-party off-the-record messaging | Goldberg, Ian; Ustaoğlu, Berkant ; Van Gundy, Matthew D.; Chen, Hao |
2009 | Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (extended version) | Ustaoğlu, Berkant |
2006 | On the importance of public-key validation in the MQV and HMQV key agreement protocols | Menezes, Alfred; Ustaoğlu, Berkant |
Aug-2016 | A practical privacy-preserving targeted advertising scheme for IPTV users | Khayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant |
2012 | Privacy-preserving targeted advertising scheme for IPTV using the cloud | Khayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant ; Örencik, Cengiz |
2013 | Quantum key distribution in the classical authenticated key exchange framework | Mosca, Michele; Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Reusing static keys in key agreement protocols | Chatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant |
2008 | Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard | Menezes, Alfred; Ustaoğlu, Berkant |
2009 | Strongly secure authenticated key exchange without NAXOS' approach | Kim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant |
2012 | Sufficient condition for ephemeral key-leakage resilient tripartite key exchange | Fujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant |
2009 | Towards denial-of-service-resilient key agreement protocols | Stebila, Douglas; Ustaoğlu, Berkant |
2009 | Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols | Fujioka, Atsushi; Suzuki, Koutarou; Ustaoğlu, Berkant |
2019 | Yürüme verisi ve konum mahremiyeti | Ustaoğlu, Berkant |