Showing results 16 to 31 of 31
< previous
Issue Date | Title | Author(s) |
2013 | Group key establishment protocols: Pairing cryptography and verifiable secret sharing scheme | Aslanoğlu, Rabia |
2017 | Implementation and evaluation of improved secure index scheme using standard and counting bloom filters | Tekin, Leyla; Şahin, Serap |
2019 | IoT - Smart contract rule based secure communication scheme for healthcare system | Kul, Aslı; Azin, Eda Nur; Özdemir, Oğulcan; Şahin, Serap |
Oct-2016 | Matching of social media accounts by using public information | Çetinkal, Yağız |
2017 | A novel approach to information spreading models for social networks | Sayın, Burcu ; Şahin, Serap |
2022 | A novel efficient method for tracking evolution of communities in dynamic networks | Karataş, Arzum ; Şahin, Serap |
2013 | On current trends in security and privacy of cloud computing | Şahin, Serap |
Apr-2022 | P/key: PUF based second factor authentication | Uysal, Ertan |
2008 | The performance results of ECDSA implementation on different coordinate systems | Atay, Serap |
2019 | Privacy issues in post dissemination on Facebook | Sayın, Burcu ; Şahin, Serap ; Kogias, Dimitrios G.; Patrikakis, Charalampos Z. |
2018 | Privacy issues on social networks | Şahin, Serap |
2021 | A review on predicting evolution of communities | Karataş, Arzum ; Şahin, Serap |
Oct-2017 | A review on social bot detection techniques and research directions | Karataş, Arzum ; Şahin, Serap |
2018 | Sosyal bot algılama teknikleri ve araştırma yönleri üzerine bir inceleme | Karataş, Arzum ; Şahin, Serap |
Feb-2022 | A study on early decryption mechanism at veriflable delay functions | Özdemir, Oğulcan |
Jul-2021 | Tracking and prediction of evolution of communities in dynamic networks | Karataş, Arzum |