Ziya Alper Genç
Ziya Alper Genç
Adresse e-mail validée de uni.lu
TitreCitée parAnnée
Examination of a New Defense Mechanism: Honeywords
ZA Genc, S Kardas, MS Kiraz
27*
No random, no ransom: a key to stop cryptographic ransomware
ZA Genç, G Lenzini, PYA Ryan
International Conference on Detection of Intrusions and Malware, and …, 2018
92018
Security and efficiency analysis of the Hamming distance computation protocol based on oblivious transfer
MS Kiraz, ZA Genç, S Kardas
Security and Communication Networks 8 (18), 4123-4135, 2015
92015
Next Generation Cryptographic Ransomware
ZA Genç, G Lenzini, PYA Ryan
Nordic Conference on Secure IT Systems, 385-401, 2018
42018
" The Simplest Protocol for Oblivious Transfer" Revisited.
ZA Genç, V Iovino, A Rial
IACR Cryptology ePrint Archive 2017, 370, 2017
42017
Detecting large integer arithmetic for defense against crypto ransomware
MS Kiraz, ZA Genç, E Öztürk
Tech. Rep., 2017
42017
A security analysis, and a fix, of a code-corrupted honeywords system
ZA Genç, G Lenzini, P Ryan, I Vazquez Sandoval
Proceedings of the 4th International Conference on Information Systems …, 2018
32018
Security attacks and enhancements to chaotic map-based RFID authentication protocols
S Kardaş, ZA Genç
Wireless Personal Communications 98 (1), 1135-1154, 2018
32018
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
ZA Genç, G Lenzini, PYA Ryan
Proceedings of the Central European Cybersecurity Conference 2018, 7, 2018
22018
The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
ZA Genç, G Lenzini, P Ryan
Advances in Cybersecurity 2017, 2017
22017
On Deception-Based Protection Against Cryptographic Ransomware
ZA Genç, G Lenzini, D Sgandurra
International Conference on Detection of Intrusions and Malware, and …, 2019
12019
A game of" Cut and Mouse" bypassing antivirus by simulating user inputs
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
2019
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
ZA Genç, G Lenzini, D Sgandurra
Proceedings of the Third Central European Cybersecurity Conference, 1-4, 2019
2019
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware
ZA Genç, G Lenzini, P Ryan
2nd International Workshop on Emerging Technologies for Authorization and …, 2019
2019
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack
ZA Genç, G Lenzini, PYA Ryan, IV Sandoval
International Conference on Information Systems Security and Privacy, 125-151, 2018
2018
Crypren Decryptor
ZA Genç
2018
Secure and efficient biometric authentication based on advanced cryptographic primitives
ZA Genç
2016
The second Central European Cybersecurity Conference–CECC 2018 aims at establishing a venue for the exchange of information on cybersecurity and its many aspects in central …
S Wendzel, D Eller, W Mazurczyk, T Bajtoš, P Sokol, T Mézešová, ...
Forensic Investigations in Vehicle Data Stores Nico Vinzenz and Tobias Eggendorfer Accommodating Time-Triggered Authentication to FlexRay Demands Pal-Stefan Murvay, Bogdan …
SD Anton, AP Lohfink, HD Schotten, S Schorradt, E Bajramovic, F Freiling, ...
Enhancing the Honeywords System: Mitigating Active Adversaries and Increasing Typo-safety of Honeywords
ZA Genc, S Kardas, MS Kiraz
Booklet of Abstracts, 8, 0
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20