Ebru Celikel Cankaya

According to our database1, Ebru Celikel Cankaya authored at least 21 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
A Secure Healthcare System: From Design to Implementation.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

2013
Applying error correction codes to achieve security and dependability.
Computer Standards & Interfaces, 2013

Analysis of heuristic based access pattern obfuscation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
A Hybrid Web Based Personal Health Record System Shielded with Comprehensive Security.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Chinese Wall Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Bell-LaPadula Confidentiality Model.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Authentication.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
Using alice in CS1: a quantitative experiment.
Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2010

2009
A risk management approach to RBAC.
Risk and Decision Analysis, 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

2007
Managing Risks in RBAC Employed Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A Smart Card Mediated Mobile Platform for Secure E-Mail Communication.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2006
Parallel performance of DES in ECB mode.
Proceedings of the International Symposium on Computer Networks, 2006

2005
Language Discrimination via PPM Model.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Word-Based Fixed and Flexible List Compression.
Proceedings of the Computer and Information Sciences, 2005

A Cryptographic Approach to Language Identification: PPM.
Proceedings of the ICEIS 2005, 2005

2004
Experiments on A Secure Compression Algorithm.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Investigating the Effects of Recency and Size of Training Text on Author Recognition Problem.
Proceedings of the Computer and Information Sciences, 2004

Improving the Compression Performance of Turkish Text with PoS Tags.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

A Preprocessor Adding Security to and Improving the Performances of Arithmetic and Huffman Codings.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
A Security Embedded Text Compression Algorithm.
Proceedings of the Computer and Information Sciences, 2003


  Loading...