Browsing by Author Ustaoğlu, Berkant

Showing results 1 to 20 of 20
Issue DateTitleAuthor(s)
May-2013Anonymity and one-way authentication in key exchange protocolsGoldberg, Ian; Stebila, Douglas; Ustaoğlu, Berkant 
2009Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)Ustaoğlu, Berkant 
2008Comparing the pre- and post-specified peer models for key agreementMenezes, Alfred; Ustaoğlu, Berkant 
2009Efficient key exchange with tight security reductionWu, Jiang; Ustaoğlu, Berkant 
Aug-2011Integrating identity-based and certificate-based authenticated key exchange protocolsUstaoğlu, Berkant 
2020Malleability and ownership of proxy signatures: Towards a stronger definiton and its limitationsChatterjee, Sanjit; Ustaoğlu, Berkant 
2010Modeling leakage of ephemeral secrets in tripartite/group key exchangeManulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant 
2009Multi-party off-the-record messagingGoldberg, Ian; Ustaoğlu, Berkant ; Van Gundy, Matthew D.; Chen, Hao
Mar-2008Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOSUstaoğlu, Berkant 
2009Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS (extended version)Ustaoğlu, Berkant 
2006On the importance of public-key validation in the MQV and HMQV key agreement protocolsMenezes, Alfred; Ustaoğlu, Berkant 
Aug-2016A practical privacy-preserving targeted advertising scheme for IPTV usersKhayati, Leyli Javid; Örencik, Cengiz; Savaş, Erkay; Ustaoğlu, Berkant 
2012Privacy-preserving targeted advertising scheme for IPTV using the cloudKhayati, Leyli Javid; Savaş, Erkay; Ustaoğlu, Berkant ; Örencik, Cengiz
2013Quantum key distribution in the classical authenticated key exchange frameworkMosca, Michele; Stebila, Douglas; Ustaoğlu, Berkant 
2009Reusing static keys in key agreement protocolsChatterjee, Sanjit; Menezes, Alfred; Ustaoğlu, Berkant 
2008Security arguments for the UM key agreement protocol in the NIST SP 800-56A standardMenezes, Alfred; Ustaoğlu, Berkant 
2009Strongly secure authenticated key exchange without NAXOS' approachKim, Minkyu; Fujioka, Atsushi; Ustaoğlu, Berkant 
2012Sufficient condition for ephemeral key-leakage resilient tripartite key exchangeFujioka, Atsushi; Manulis, Mark; Suzuki, Koutarou; Ustaoğlu, Berkant 
2009Towards denial-of-service-resilient key agreement protocolsStebila, Douglas; Ustaoğlu, Berkant 
2009Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocolsFujioka, Atsushi; Suzuki, Koutarou; Ustaoğlu, Berkant