Albert Levi

Orcid: 0000-0002-9714-3897

According to our database1, Albert Levi authored at least 97 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Data driven intrusion detection for 6LoWPAN based IoT systems.
Ad Hoc Networks, April, 2023

2022
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions.
ACM Comput. Surv., January, 2022

Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity.
IEEE Trans. Dependable Secur. Comput., 2022

Investigation and Application of Differential Privacy in Bitcoin.
IEEE Access, 2022

2021
Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms.
IEEE Access, 2021

Scalable Wi-Fi Intrusion Detection for IoT Systems.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Disclosure of Personal Information in Passwords on Social Media.
Proceedings of the 28th Signal Processing and Communications Applications Conference, 2020

Secure and Privacy-Aware Gateway for Home Automation Systems.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Augmented Randomness for Secure Key Agreement using Physiological Signals.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Flexible fair and collusion resistant pseudonym providing system.
Int. Arab J. Inf. Technol., 2019

Two-tier anomaly detection based on traffic profiling of the home automation system.
Comput. Networks, 2019

Secure key agreement based on ordered biometric features.
Comput. Networks, 2019

An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
Comput. J., 2019

SKA-PS: Secure key agreement protocol using physiological signals.
Ad Hoc Networks, 2019

TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems.
IEEE Commun. Surv. Tutorials, 2018

Secure key agreement protocols: Pure biometrics and cancelable biometrics.
Comput. Networks, 2018

Generating One-Time Keys for Secure Multimedia Communication.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Deriving cryptographic keys from physiological signals.
Pervasive Mob. Comput., 2017

Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates.
IACR Cryptol. ePrint Arch., 2017

Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context.
Ad Hoc Networks, 2017

DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks.
Ad Hoc Networks, 2017

Feature-level fusion of physiological parameters to be used as cryptographic keys.
Proceedings of the IEEE International Conference on Communications, 2017

Robust Two-factor smart card authentication.
Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017

SU-PhysioDB: A physiological signals database for body area network security.
Proceedings of the 2017 IEEE International Black Sea Conference on Communications and Networking, 2017

2016
WebRTC based augmented secure communication.
Proceedings of the 24th Signal Processing and Communication Application Conference, 2016

2015
<i>k</i>-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions.
Wirel. Commun. Mob. Comput., 2015

Mobile malware classification based on permission data.
Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU), 2015

Towards using physiological signals as cryptographic keys in Body Area Networks.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

A Role and Activity Based Access Control for Secure Healthcare Systems.
Proceedings of the Information Sciences and Systems 2015, 2015

Secure key agreement using pure biometrics.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks.
Peer-to-Peer Netw. Appl., 2014

A Survey on the Development of Security Mechanisms for Body Area Networks.
Comput. J., 2014

A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems".
Ad Hoc Networks, 2014

2013
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2013

Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks.
Proceedings of the Information Sciences and Systems 2013, 2013

HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

Maintaining trajectory privacy in mobile wireless sensor networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A New Security and Privacy Framework for RFID in Cloud Computing.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Dynamic key ring update mechanism for Mobile Wireless Sensor Networks.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

2012
PUF-enhanced offline RFID security and privacy.
J. Netw. Comput. Appl., 2012

A secure and private RFID authentication protocol based on quadratic residue.
Proceedings of the 20th International Conference on Software, 2012

Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication.
Proceedings of the Computer and Information Sciences III, 2012

2011
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data.
Int. J. Data Warehous. Min., 2011

Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach.
Comput. J., 2011

CoRPPS: Collusion Resistant Pseudonym Providing System.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Providing Resistance against Server Information Leakage in RFID Systems.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks.
Proceedings of the Computer and Information Sciences II, 2011

PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

Digital Trust Games: An Experimental Study.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Resilient key establishment for mobile sensor networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

Preserving organizational privacy in intrusion detection log sharing.
Proceedings of the 3rd International Conference on Cyber Conflict, 2011

2010
Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures.
Sensors, 2010

Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments.
Mob. Networks Appl., 2010

Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools.
J. Intell. Manuf., 2010

Using combined keying materials for key distribution in wireless sensor networks.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

A distributed key establishment scheme for wireless mesh networks using identity-based cryptography.
Proceedings of the Q2SWinet'10, 2010

P<sup>2</sup>-CTM: privacy preserving collaborative traffic monitoring.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2010

A game theoretic model for digital identity and trust in online communities.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach.
Comput. Secur., 2009

Public key cryptography based privacy preserving multi-context RFID infrastructure.
Ad Hoc Networks, 2009

A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

A resilient key predistribution scheme for multiphase wireless sensor networks.
Proceedings of the 24th International Symposium on Computer and Information Sciences, 2009

Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Disclosure Risks of Distance Preserving Data Transformations.
Proceedings of the Scientific and Statistical Database Management, 2008

Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.
Proceedings of the SECRYPT 2008, 2008

Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

Towards a framework for security analysis of multiple password schemes.
Proceedings of the First European Workshop on System Security, 2008

Distributed privacy preserving k-means clustering with additive secret sharing.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks.
Proceedings of the Visions of Computer Science, 2008

2007
Privacy preserving clustering on horizontally partitioned data.
Data Knowl. Eng., 2007

Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

2006
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2006

An optimistic fair e-commerce protocol for large e-goods.
Proceedings of the International Symposium on Computer Networks, 2006

Privacy Preserving Clustering on Horizontally Partitioned Data.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

2005
A Fair Multimedia Exchange Protocol.
Proceedings of the Computer and Information Sciences, 2005

SeFER: secure, flexible and efficient routing protocol for distributed sensor networks.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol.
Proceedings of the New Trends in Computer Networks, 2005

2004
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure.
ACM Trans. Inf. Syst. Secur., 2004

Relay Attacks on Bluetooth Authentication and Solutions.
Proceedings of the Computer and Information Sciences, 2004

Sensor wars: detecting and defending against spam attacks in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2004

Practical and Secure E-Mail System (PractiSES).
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
How secure is secure Web browsing?
Commun. ACM, 2003

Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2001
Risks in email security.
Commun. ACM, 2001

Reducing Certificate Revocating Cost using NPKI.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

1999
Design and performanceevalution of the nested certification scheme and its application in public key infrastructures (İçiçe sertifikasyon düzeninin ve açık anahtar altyapılarındaki uygulamalarının tasarımı ve başarım değerlendirilmesi)
PhD thesis, 1999

Analytical Performance Evaluation of Nested Certificates.
Perform. Evaluation, 1999

A gigabyte-per-second parallel fiber optic network interface for multimedia applications.
IEEE Netw., 1999

Verification of classical certificates via nested certificates and nested certificate paths.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999


  Loading...