Security Challenges in Cloud Computing. L Ertaul, S Singhal, G Saldamli Security and Management, 36-42, 2010 | 79 | 2010 |
Elliptic and hyperelliptic curves on embedded μP T Wollinger, J Pelzl, V Wittelsberger, C Paar, G Saldamli, ÇK Koç ACM Transactions on Embedded Computing Systems (TECS) 3 (3), 509-533, 2004 | 50 | 2004 |
Private proximity testing with an untrusted server G Saldamli, R Chow, H Jin, B Knijnenburg Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 30 | 2013 |
Spectral modular exponentiation G Saldamli, CK Koç 18th IEEE Symposium on Computer Arithmetic (ARITH'07), 123-132, 2007 | 22 | 2007 |
Secure voice communication via GSM network MA Ozkan, B Ors, G Saldamli 2011 7th International Conference on Electrical and Electronics Engineering …, 2011 | 20 | 2011 |
Reconsidering big data security and privacy in cloud and mobile cloud systems AT Lo'ai, G Saldamli Journal of King Saud University-Computer and Information Sciences, 2019 | 15 | 2019 |
Spectral modular arithmetic G Saldamli | 15 | 2005 |
Homomorphic encryption in computing systems and environments G Saldamli US Patent 9,436,835, 2016 | 12 | 2016 |
Implementation of a PUF circuit on a FPGA M Soybali, B Ors, G Saldamli 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 11 | 2011 |
Analyzing and comparing the Montgomery multiplication algorithms for their power consumption D Bayhan, SB Ors, G Saldamli The 2010 International Conference on Computer Engineering & Systems, 257-261, 2010 | 11 | 2010 |
Unbalanced states violates RFID privacy I Erguler, E Anarim, G Saldamli Journal of Intelligent Manufacturing 25 (2), 273-281, 2014 | 9 | 2014 |
Analyzing and comparing the AES architectures for their power consumption A Dogan, SB Ors, G Saldamli Journal of Intelligent Manufacturing 25 (2), 263-271, 2014 | 9 | 2014 |
Recommendations-based location privacy control H Jin, G Saldamli, R Chow, BP Knijnenburg 2013 IEEE International Conference on Pervasive Computing and Communications …, 2013 | 9 | 2013 |
Privacy in mobile personalized systems: The effect of disclosure justifications BP Knijnenburg, A Kobsa, G Saldamli Proceedings of the SOUPS 2012 Workshop on Usable Privacy & Security for …, 2012 | 8 | 2012 |
Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP I Erguler, C Unsal, E Anarim, G Saldamli Security and Communication Networks 5 (3), 287-291, 2012 | 8 | 2012 |
A salient missing link in rfid security protocols I Erguler, E Anarim, G Saldamli EURASIP Journal on Wireless Communications and Networking 2011, 1-9, 2011 | 8 | 2011 |
Vectorial private equality testing G Saldamli, R Chow, H Jin, B Knijnenburg US Patent 9,390,271, 2016 | 6 | 2016 |
Architectures for fast modular multiplication A Aris, B Ors, G Saldamli 2011 14th Euromicro Conference on Digital System Design, 434-437, 2011 | 6 | 2011 |
Wildfire Detection using Wireless Mesh Network G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC …, 2019 | 5 | 2019 |
Post-Quantum Cryptography on IoT: Merkle's Tree Authentication G Saldamli, L Ertaul, B Kodirangaiah Proceedings of the International Conference on Wireless Networks (ICWN), 35-41, 2018 | 5 | 2018 |