Attila A. Yavuz

Orcid: 0000-0002-8680-9307

Affiliations:
  • University of South Florida, Tampa, Department of Computer Science and Engineering
  • Oregon State University, Corvallis, School of Electrical Engineering and Computer Science
  • University of Pittsburgh, School of Information Sciences


According to our database1, Attila A. Yavuz authored at least 78 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Scalable and Lightweight Post-Quantum Authentication for Internet of Things.
CoRR, 2023

A Comprehensive Survey of Threshold Digital Signatures: NIST Standards, Post-Quantum Cryptography, Exotic Techniques, and Real-World Applications.
CoRR, 2023

Envisioning the Future of Cyber Security in Post-Quantum Era: A Survey on PQ Standardization, Applications, Challenges and Opportunities.
CoRR, 2023

Post-Quantum Hybrid Digital Signatures with Hardware-Support for Digital Twins.
CoRR, 2023

A Survey on AI/ML-Driven Intrusion and Misbehavior Detection in Networked Autonomous Systems: Techniques, Challenges and Opportunities.
CoRR, 2023

Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems.
Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, 2023

Post-Quantum Forward-Secure Signatures with Hardware-Support for Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2023

Lightweight Digital Signatures for Internet of Things: Current and Post-Quantum Trends and Visions.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
Ultra Lightweight Multiple-Time Digital Signature for the Internet of Things Devices.
IEEE Trans. Serv. Comput., 2022

Efficient Dynamic Proof of Retrievability for Cold Storage.
IACR Cryptol. ePrint Arch., 2022

Titanium: A Metadata-Hiding File-Sharing System with Malicious Security.
IACR Cryptol. ePrint Arch., 2022

FROG: Forward-Secure Post-Quantum Signature.
CoRR, 2022

Distributed Cyber-infrastructures and Artificial Intelligence in Hybrid Post-Quantum Era.
Proceedings of the 4th IEEE International Conference on Trust, 2022

2021
A Secure Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IEEE Trans. Serv. Comput., 2021

Efficient Oblivious Data Structures for Database Services on the Cloud.
IEEE Trans. Cloud Comput., 2021

Anonymous Dynamic Spectrum Access and Sharing Mechanisms for the CBRS Band.
IEEE Access, 2021

Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Multi-server ORAM Framework with Constant Client Bandwidth Blowup.
ACM Trans. Priv. Secur., 2020

Lattice-Based Public Key Searchable Encryption from Experimental Perspectives.
IEEE Trans. Dependable Secur. Comput., 2020

MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework.
IACR Cryptol. ePrint Arch., 2020

Trace-Σ: a privacy-preserving contact tracing app.
IACR Cryptol. ePrint Arch., 2020

Lattice-Based Proof-of-Work for Post-Quantum Blockchains.
IACR Cryptol. ePrint Arch., 2020

Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT.
Proceedings of the Information Security - 23rd International Conference, 2020

MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Compact and Resilient Cryptographic Tools for Digital Forensics.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Location Privacy in Cognitive Radios With Multi-Server Private Information Retrieval.
IEEE Trans. Cogn. Commun. Netw., 2019

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.
Proc. Priv. Enhancing Technol., 2019

A multi-server oblivious dynamic searchable encryption framework.
J. Comput. Secur., 2019

IoD-Crypt: A Lightweight Cryptographic Framework for Internet of Drones.
CoRR, 2019

TrustSAS: A Trustworthy Spectrum Access System for the 3.5 GHz CBRS Band.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

ARIS: Authentication for Real-Time IoT Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Energy-Aware Digital Signatures for Embedded Medical Devices.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Immutable Authentication and Integrity Schemes for Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2018

Fast Authentication from Aggregate Signatures with Improved Security.
IACR Cryptol. ePrint Arch., 2018

Compact Energy and Delay-aware Authentication.
IACR Cryptol. ePrint Arch., 2018

TACHYON: Fast Signatures from Compact Knapsack.
IACR Cryptol. ePrint Arch., 2018

Unleashing the Power of Multi-Server PIR for Enabling Private Access to Spectrum Databases.
IEEE Commun. Mag., 2018

Dronecrypt - An Efficient Cryptographic Framework for Small Aerial Drones.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Oblivious Dynamic Searchable Encryption on Distributed Cloud Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
Real-Time Digital Signatures for Time-Critical Networks.
IEEE Trans. Inf. Forensics Secur., 2017

Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing.
IEEE Trans. Inf. Forensics Secur., 2017

Location Privacy Preservation in Database-Driven Wireless Cognitive Networks Through Encrypted Probabilistic Data Structures.
IEEE Trans. Cogn. Commun. Netw., 2017

Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones.
IACR Cryptol. ePrint Arch., 2017

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search.
IACR Cryptol. ePrint Arch., 2017

A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services.
IACR Cryptol. ePrint Arch., 2017

Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM.
IACR Cryptol. ePrint Arch., 2017

S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

Lattice-Based Public Key Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2017

Location Privacy in Cognitive Radio Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Post-quantum hybrid security mechanism for MIMO systems.
Proceedings of the 2017 International Conference on Computing, 2017

High-Speed High-Security Public Key Encryption with Keyword Search.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

When the hammer meets the nail: Multi-server PIR for database-driven CRN with location privacy assurance.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

S<sup>3</sup>ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Mitigating jamming attacks in mobile cognitive networks through time hopping.
Wirel. Commun. Mob. Comput., 2016

An efficient technique for protecting location privacy of cooperative spectrum sensing users.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Practical and secure dynamic searchable encryption via oblivious access on distributed data structure.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
A Secure Communication Architecture for Distributed Microgrid Control.
IEEE Trans. Smart Grid, 2015

BAFi: a practical cryptographic secure audit logging scheme for digital forensics.
Secur. Commun. Networks, 2015

Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware.
IACR Cryptol. ePrint Arch., 2015

HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Pseudorandom Time-Hopping Anti-Jamming Technique for Mobile Cognitive Users.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
An Efficient Real-Time Broadcast Authentication Scheme for Command and Control Messages.
IEEE Trans. Inf. Forensics Secur., 2014

2013
ETA: efficient and tiny and authentication for heterogeneous wireless systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Practical Immutable Signature Bouquets (PISB) for Authentication and Integrity in Outsourced Databases.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems.
ACM Trans. Inf. Syst. Secur., 2012

Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks.
Ad Hoc Networks, 2012

Efficient, Compromise Resilient and Append-Only Cryptographic Schemes for Secure Audit Logging.
Proceedings of the Financial Cryptography and Data Security, 2012

2009
Hash-Based Sequential Aggregate and Forward Secure Signature for Unattended Wireless Sensor Networks.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2006
Improved Merkle Cryptosystem (IMC).
Proceedings of the Computer and Information Sciences, 2006

HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange Schemes.
Proceedings of the Computer and Information Sciences, 2006

NAMEPS: N -Tier Satellite Multicast Security Protocol Based on Signcryption Schemes.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Three-tier satellite multicast security protocol based on ECMQV and IMC methods.
Proceedings of the IEEE 11th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2006


  Loading...