Melek Önen

According to our database1, Melek Önen authored at least 65 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Protecting Citizens' Personal Data and Privacy: Joint Effort from GDPR EU Cluster Research Projects.
SN Comput. Sci., 2020

QSOR: Quantum-safe Onion Routing.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

SwaNN: Switching among Cryptographic Tools for Privacy-preserving Neural Network Predictions.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

ProteiNN: Privacy-preserving One-to-Many Neural Network Classifications.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
UPRISE-IoT: User-Centric Privacy & Security in the IoT.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

PAPAYA: A Platform for Privacy Preserving Data Analytics.
ERCIM News, 2019

Privacy-preserving delegable authentication in the internet of things.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

SoK: Cryptography for Neural Networks.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

PORTOS: Proof of Data Reliability for Real-World Distributed Outsourced Storage.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

PAC: Privacy-Preserving Arrhythmia Classification with Neural Networks.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

2018
Device Identification and Personal Data Attestation in Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Secure and Scalable Multi-User Searchable Encryption.
IACR Cryptol. ePrint Arch., 2018

CHARIOT: Cloud-Assisted Access Control for the Internet of Things.
IACR Cryptol. ePrint Arch., 2018

Lightweight secure bootstrap and message attestation in the internet of things.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Emotion-Awareness for Intelligent Vehicle Assistants: A Research Agenda.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for AI in Autonomous Systems, 2018

Fast Two-Server Multi-User Searchable Encryption with Strict Access Pattern Leakage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

FHE-Compatible Batch Normalization for Privacy Preserving Deep Learning.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Breaking and Fixing the Security Proof of Garbled Bloom Filters.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Framework for Searchable Encryption with SQL Databases.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

POROS: Proof of Data Reliability for Outsourced Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2017
A Leakage-Abuse Attack Against Multi-User Searchable Encryption.
Proc. Priv. Enhancing Technol., 2017

Reconciling Security and Functional Requirements in Multi-tenant Clouds.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud.
ERCIM News, 2016

Message-Locked Proofs of Retrievability with Secure Deduplication.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Efficient Techniques for Publicly Verifiable Delegation of Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
PUDA - Privacy and Unforgeability for Data Aggregation.
IACR Cryptol. ePrint Arch., 2015

Online-Offline Homomorphic Signatures for Polynomial Functions.
IACR Cryptol. ePrint Arch., 2015

Multi-user Searchable Encryption in the Cloud.
Proceedings of the Information Security - 18th International Conference, 2015

PerfectDedup: Secure Data Deduplication.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Publicly verifiable conjunctive keyword search in outsourced databases.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Block-level De-duplication with Encrypted Data.
Open J. Cloud Comput., 2014

Privacy preserving delegated word search in the cloud.
IACR Cryptol. ePrint Arch., 2014

Opportunistic networks.
Comput. Commun., 2014

A P2P based usage control enforcement scheme resilient to re-injection attacks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Privacy Preserving Statistics in the Smart Grid.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

A-PPL: An Accountability Policy Language.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

StealthGuard: Proofs of Retrievability with Hidden Watchdogs.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Cloud Accountability Policy Representation Framework.
Proceedings of the CLOSER 2014, 2014

From Regulatory Obligations to Enforceable Accountability Policies in the Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

2013
ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

Privacy Preserving Similarity Detection for Data Analysis.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Local key management in opportunistic networks.
Int. J. Commun. Networks Distributed Syst., 2012

Special section on Security and Social Networking.
Comput. Commun., 2012

PRICE: Privacy preserving incentives for cooperation enforcement.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks.
Proceedings of the Fifth Workshop on Social Network Systems, 2012

2011
PRISM - Privacy-Preserving Search in MapReduce.
IACR Cryptol. ePrint Arch., 2011

Safebook: A distributed privacy preserving Online Social Network.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Catch the Jammer in Wireless Sensor Network.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Broker-Based Private Matching.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Analysis of Privacy in Online Social Networks from the Graph Theory Perspective.
Proceedings of the Global Communications Conference, 2011

2010
Secure P2P Data Storage and Maintenance.
Int. J. Digit. Multim. Broadcast., 2010

Privacy and confidentiality in context-based and epidemic forwarding.
Comput. Commun., 2010

Bootstrapping security associations in opportunistic networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

2009
Privacy in context-based and epidemic forwarding.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

Privacy-Preserving Content-Based Publish/Subscribe Networks.
Proceedings of the Emerging Challenges for Security, 2009

Privacy in Content-Based Opportunistic Networks.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Security Protocol for Self-Organizing Data Storage.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
Optimistic fair exchange for secure forwarding.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Secure Data Aggregation with Multiple Encryption.
Proceedings of the Wireless Sensor Networks, 2007

2006
Simulation based performance evaluation of a user-centric group rekeying protocol.
Proceedings of IEEE International Conference on Communications, 2006

2004
Group Rekeying with a Customer Perspective.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Denial of service prevention in satellite networks.
Proceedings of IEEE International Conference on Communications, 2004

Reliable group rekeying with a customer perspective.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...