Albert Levi
Orcid: 0000-0002-9714-3897
  According to our database1,
  Albert Levi
  authored at least 99 papers
  between 1999 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
  2024
    IEEE Trans. Dependable Secur. Comput., 2024
    
  
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All...".
    
  
    Proceedings of the 33rd USENIX Security Symposium, 2024
    
  
  2023
    Ad Hoc Networks, April, 2023
    
  
  2022
    ACM Comput. Surv., January, 2022
    
  
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity.
    
  
    IEEE Trans. Dependable Secur. Comput., 2022
    
  
  2021
Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms.
    
  
    IEEE Access, 2021
    
  
    Proceedings of the 11th IFIP International Conference on New Technologies, 2021
    
  
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT.
    
  
    Proceedings of the International Symposium on Networks, Computers and Communications, 2021
    
  
  2020
    Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020
    
  
    Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
    
  
    Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
    
  
  2019
    Int. Arab J. Inf. Technol., 2019
    
  
    Comput. Networks, 2019
    
  
    Comput. J., 2019
    
  
    Ad Hoc Networks, 2019
    
  
    Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
    
  
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation.
    
  
    Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
    
  
  2018
    IEEE Commun. Surv. Tutorials, 2018
    
  
    Comput. Networks, 2018
    
  
    Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
    
  
  2017
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
    
  
    IACR Cryptol. ePrint Arch., 2017
    
  
Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context.
    
  
    Ad Hoc Networks, 2017
    
  
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.
    
  
    Ad Hoc Networks, 2017
    
  
    Proceedings of the IEEE International Conference on Communications, 2017
    
  
    Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017
    
  
    Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017
    
  
  2016
    Proceedings of the 24th Signal Processing and Communication Application Conference, 2016
    
  
  2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
    
  
    Wirel. Commun. Mob. Comput., 2015
    
  
    Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015
    
  
    Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015
    
  
    Proceedings of the Information Sciences and Systems 2015, 2015
    
  
    Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
    
  
  2014
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks.
    
  
    Peer-to-Peer Netw. Appl., 2014
    
  
    Comput. J., 2014
    
  
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
    
  
    Ad Hoc Networks, 2014
    
  
  2013
    Proceedings of the Lightweight Cryptography for Security and Privacy, 2013
    
  
    Proceedings of the Information Sciences and Systems 2013, 2013
    
  
HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks.
    
  
    Proceedings of IEEE International Conference on Communications, 2013
    
  
    Proceedings of the IEEE Conference on Communications and Network Security, 2013
    
  
    Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
    
  
    Proceedings of the First International Black Sea Conference on Communications and Networking, 2013
    
  
  2012
    Proceedings of the 20th International Conference on Software, 2012
    
  
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication.
    
  
    Proceedings of the Computer and Information Sciences III, 2012
    
  
  2011
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data.
    
  
    Int. J. Data Warehous. Min., 2011
    
  
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach.
    
  
    Comput. J., 2011
    
  
    Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
    
  
    Proceedings of the 4th IFIP International Conference on New Technologies, 2011
    
  
    Proceedings of the Computer and Information Sciences II, 2011
    
  
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism.
    
  
    Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011
    
  
    Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011
    
  
    Proceedings of the Distributed Computing in Sensor Systems, 2011
    
  
    Proceedings of the 3rd International Conference on Cyber Conflict, 2011
    
  
  2010
Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures.
    
  
    Sensors, 2010
    
  
Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments.
    
  
    Mob. Networks Appl., 2010
    
  
Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools.
    
  
    J. Intell. Manuf., 2010
    
  
    Proceedings of the IEEE 21st International Symposium on Personal, 2010
    
  
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography.
    
  
    Proceedings of the Q2SWinet'10, 2010
    
  
    Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010
    
  
    Proceedings of the 5th ACM Symposium on Information, 2010
    
  
  2009
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach.
    
  
    Comput. Secur., 2009
    
  
    Ad Hoc Networks, 2009
    
  
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks.
    
  
    Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009
    
  
    Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009
    
  
    Proceedings of IEEE International Conference on Communications, 2009
    
  
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks.
    
  
    Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
    
  
  2008
    Proceedings of the Scientific and Statistical Database Management, 2008
    
  
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.
  
    Proceedings of the SECRYPT 2008, 2008
    
  
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.
    
  
    Proceedings of the e-Business and Telecommunications - International Conference, 2008
    
  
    Proceedings of the First European Workshop on System Security, 2008
    
  
    Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008
    
  
Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks.
    
  
    Proceedings of the Visions of Computer Science, 2008
    
  
  2007
    Data Knowl. Eng., 2007
    
  
    Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
    
  
    Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
    
  
  2006
    IEEE Trans. Mob. Comput., 2006
    
  
    Proceedings of the International Symposium on Computer Networks, 2006
    
  
    Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006
    
  
  2005
    Proceedings of the Computer and Information Sciences, 2005
    
  
SeFER: secure, flexible and efficient routing protocol for distributed sensor networks.
    
  
    Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005
    
  
Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol.
    
  
    Proceedings of the New Trends in Computer Networks, 2005
    
  
  2004
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure.
    
  
    ACM Trans. Inf. Syst. Secur., 2004
    
  
    Proceedings of the Computer and Information Sciences, 2004
    
  
Sensor wars: detecting and defending against spam attacks in wireless sensor networks.
    
  
    Proceedings of IEEE International Conference on Communications, 2004
    
  
    Proceedings of the Advances in Information Systems, Third International Conference, 2004
    
  
  2003
    Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
    
  
  2001
Reducing Certificate Revocating Cost using NPKI.
  
    Proceedings of the Trusted Information: The New Decade Challenge, 2001
    
  
    Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001
    
  
  2000
    Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
    
  
  1999
Design and performanceevalution of the nested certification scheme and its application in public key infrastructures (İçiçe sertifikasyon düzeninin ve açık anahtar altyapılarındaki uygulamalarının tasarımı ve başarım değerlendirilmesi)
    
  
    PhD thesis, 1999
    
  
Analytical Performance Evaluation of Nested Certificates.
  
    Perform. Evaluation, 1999
    
  
A gigabyte-per-second parallel fiber optic network interface for multimedia applications.
    
  
    IEEE Netw., 1999
    
  
Verification of classical certificates via nested certificates and nested certificate paths.
    
  
    Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999