ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems A Mahnamfar, K Bicakci, Y Uzunay Computers & Security 139, 103739, 2024 | | 2024 |
Quantum-Resistance Meets White-BoxCryptography: How to Implement Hash-BasedSignatures against White-Box Attackers? K Bicakci, K Ulker, Y Uzunay, HT Şahin, MS Gündoğan | | 2024 |
QRAuth: A Secure and Accessible Web Authentication Alternative to FIDO2 K Bicakci, A Drobi 2023 16th International Conference on Information Security and Cryptology …, 2023 | | 2023 |
Optimal data backup policies for information systems subject to sudden failure S Tekin, K Bicakci, O Mersin, GN Erdem, A Canbay, Y Uzunay Journal of Quality in Maintenance Engineering 29 (2), 338-355, 2023 | 4 | 2023 |
Authentication-enabled attribute-based access control for smart homes M Burakgazi Bilgen, O Abul, K Bicakci International Journal of Information Security 22 (2), 479-495, 2023 | 1 | 2023 |
KAIME: Central bank digital currency with realistic and modular privacy A Dogan, K Bicakci Cryptology ePrint Archive, 2023 | 3 | 2023 |
Is FIDO2 passwordless authentication a hype or for real?: A position paper K Bicakci, Y Uzunay 2022 15th International Conference on Information Security and Cryptography …, 2022 | 8 | 2022 |
Should Users Trust Their Android Devices? A Scoring System for Assessing Security and Privacy Risks of Pre-Installed Applications A Ozbay, K Bicakci arXiv preprint arXiv:2203.10583, 2022 | 1 | 2022 |
Should Users Trust Their Android Devices? An Analysis and Scoring System for Pre-Installed Applications A Ozbay, K Bicakci An Analysis and Scoring System for Pre-Installed Applications, 2022 | | 2022 |
Android Pre-installed Applications Effects On User’s Privacy A Özbay, K Bıçakcı 2021 International Conference on Information Security and Cryptology …, 2021 | 2 | 2021 |
Towards zero trust: the design and implementation of a secure end-point device for remote working K Bicakci, Y Uzunay, M Khan 2021 International Conference on Information Security and Cryptology …, 2021 | 4 | 2021 |
Exploring and Improving the Usability of ModSecurity Web Application Firewall M Alagoz, MS Tok, K Bicakci 2021 International Conference on Information Security and Cryptology …, 2021 | | 2021 |
Method for secure connection M Gözütok, O Sereflisan, K Biçakci US Patent 11,159,320, 2021 | | 2021 |
Android Ön yüklü Uygulamaların Kullanıcı Mahremiyetine Etkileri A Özbay, K Bicakci 14th International Conference on Information Security and Cryptology …, 2021 | | 2021 |
White-Box Implementations for Hash-Based Signatures and One-Time Passwords. K Bicakci, K Ulker, Y Uzunay, HT Sahin, MS Gündogan IACR Cryptol. ePrint Arch. 2021, 968, 2021 | | 2021 |
Extending attribute-based access control model with authentication information for Internet of Things MB Bilgen, K Bicakci 2020 International Conference On Information Security And Cryptology …, 2020 | 4 | 2020 |
Security analysis of mobile authenticator applications C Ozkan, K Bicakci 2020 International Conference on Information Security and Cryptology …, 2020 | 14 | 2020 |
Analysis and evaluation of keystroke dynamics as a feature of contextual authentication K Bicakci, O Salman, Y Uzunay, M Tan 2020 International Conference on Information Security and Cryptology …, 2020 | 5 | 2020 |
A survey of denial-of-service attacks and solutions in the smart grid A Huseinović, S Mrdović, K Bicakci, S Uludag IEEE Access 8, 177447-177470, 2020 | 123 | 2020 |
Using attribute-based feature selection approaches and machine learning algorithms for detecting fraudulent website URLs M Aydin, I Butun, K Bicakci, N Baykal 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 20 | 2020 |