Levent Ertaul

According to our database1, Levent Ertaul authored at least 23 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Analysis of Lightweight Message Authentication Codes for IoT Environments.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

Wildfire Detection using Wireless Mesh Network.
Proceedings of the Fourth International Conference on Fog and Mobile Edge Computing, 2019

2010
Security Evaluation of CDMA2000.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Security Challenges in Cloud Computing.
Proceedings of the 2010 International Conference on Security & Management, 2010

Security Issues for Mobile Government.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Security in Wireless Sensor Networks - A Study.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs).
Proceedings of the 2009 International Conference on Security & Management, 2009

Today & Tomorrow: IEEE 802.11 WLAN Security.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Implementation of Domingo Ferrer's a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN).
Proceedings of the 2008 International Conference on Security & Management, 2008

Implementations of Montgomery Multiplication Algorithms in Machine Languages.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs).
Proceedings of the 2007 International Conference on Wireless Networks, 2007

On the Generation of X.509v3 Certificates with Biometric Information.
Proceedings of the 2007 International Conference on Security & Management, 2007

RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs.
Proceedings of the 2007 International Conference on Security & Management, 2007

A PDA Implementation of an Off-line e-Cash Protocol.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
GSM Security II.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

Mobile Agent Security.
Proceedings of the 2006 International Conference on Security & Management, 2006

Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
Novel Obfuscation Algorithms for Software Security.
Proceedings of the International Conference on Software Engineering Research and Practice, 2005

ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I).
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

GSM Security.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
JHide - A tool kit for code obfuscation.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

1994
A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols.
PhD thesis, 1994


  Loading...