default search action
Albert Levi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1999
- [b1]Albert Levi:
Design and performanceevalution of the nested certification scheme and its application in public key infrastructures (İçiçe sertifikasyon düzeninin ve açık anahtar altyapılarındaki uygulamalarının tasarımı ve başarım değerlendirilmesi). Boğaziçi University, Turkey, 1999
Journal Articles
- 2024
- [j35]Cavit Özbay, Albert Levi:
Blacklisting Based Anonymous Authentication Scheme for Sharing Economy. IEEE Trans. Dependable Secur. Comput. 21(2): 828-846 (2024) - 2023
- [j34]Faik Kerem Örs, Albert Levi:
Data driven intrusion detection for 6LoWPAN based IoT systems. Ad Hoc Networks 143: 103120 (2023) - 2022
- [j33]Merve Can Kus Khalilov, Albert Levi:
Investigation and Application of Differential Privacy in Bitcoin. IEEE Access 10: 25534-25554 (2022) - [j32]Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. ACM Comput. Surv. 54(11s): 238:1-238:37 (2022) - [j31]Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity. IEEE Trans. Dependable Secur. Comput. 19(2): 835-847 (2022) - 2021
- [j30]Artrim Kjamilji, Erkay Savas, Albert Levi:
Efficient Secure Building Blocks With Application to Privacy Preserving Machine Learning Algorithms. IEEE Access 9: 8324-8353 (2021) - 2019
- [j29]Duygu Karaoglan Altop, Beste Seymen, Albert Levi:
SKA-PS: Secure key agreement protocol using physiological signals. Ad Hoc Networks 83: 111-124 (2019) - [j28]Muhammed Ali Bingöl, Osman Biçer, Mehmet Sabir Kiraz, Albert Levi:
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. Comput. J. 62(4): 598-613 (2019) - [j27]Mariusz Gajewski, Jordi Mongay Batalla, Albert Levi, Cengiz Togay, Constandinos X. Mavromoustakis, George Mastorakis:
Two-tier anomaly detection based on traffic profiling of the home automation system. Comput. Networks 158: 46-60 (2019) - [j26]Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi:
Secure key agreement based on ordered biometric features. Comput. Networks 163 (2019) - [j25]Belal Amro, Albert Levi, Yücel Saygin:
Flexible fair and collusion resistant pseudonym providing system. Int. Arab J. Inf. Technol. 16(1): 80-87 (2019) - 2018
- [j24]Dilara Akdogan, Duygu Karaoglan Altop, Laleh Eskandarian, Albert Levi:
Secure key agreement protocols: Pure biometrics and cancelable biometrics. Comput. Networks 142: 33-48 (2018) - [j23]Merve Can Kus Khalilov, Albert Levi:
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems. IEEE Commun. Surv. Tutorials 20(3): 2543-2585 (2018) - 2017
- [j22]Duygu Karaoglan Altop, Muhammed Ali Bingöl, Albert Levi, Erkay Savas:
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks. Ad Hoc Networks 54: 53-68 (2017) - [j21]Albert Levi, Salim Sarimurat:
Utilizing hash graphs for key distribution for mobile and replaceable interconnected sensors in the IoT context. Ad Hoc Networks 57: 3-18 (2017) - [j20]Duygu Karaoglan Altop, Albert Levi, Volkan Tuzcu:
Deriving cryptographic keys from physiological signals. Pervasive Mob. Comput. 39: 65-79 (2017) - 2015
- [j19]Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Hüseyin Demirci, Albert Levi:
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wirel. Commun. Mob. Comput. 15(18): 2150-2166 (2015) - 2014
- [j18]Albert Levi, Özgür Gürbüz, Antonio Maña, Marek Klonowski, Matteo Cesana, Mona Ghassemian, Susana Sargento:
A special issue of ad hoc networks on "Smart solutions for mobility supported distributed and embedded systems". Ad Hoc Networks 15: 1-3 (2014) - [j17]Duygu Karaoglan, Albert Levi:
A Survey on the Development of Security Mechanisms for Body Area Networks. Comput. J. 57(10): 1484-1512 (2014) - [j16]Kübra Kalkan, Albert Levi:
Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks. Peer-to-Peer Netw. Appl. 7(4): 698-709 (2014) - 2012
- [j15]Süleyman Kardas, Serkan Celik, Muhammet Yildiz, Albert Levi:
PUF-enhanced offline RFID security and privacy. J. Netw. Comput. Appl. 35(6): 2059-2067 (2012) - 2011
- [j14]Murat Ergun, Albert Levi, Erkay Savas:
Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach. Comput. J. 54(4): 602-616 (2011) - [j13]Can Yildizli, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi:
Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data. Int. J. Data Warehous. Min. 7(1): 46-66 (2011) - 2010
- [j12]Albert Levi, Sinan Emre Tasçi, Young Jae Lee, Yong Jae Lee, Ersoy Bayramoglu, Murat Ergun:
Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. J. Intell. Manuf. 21(5): 635-645 (2010) - [j11]Abdülhakim Ünlü, Albert Levi:
Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments. Mob. Networks Appl. 15(4): 517-529 (2010) - [j10]Hayretdin Bahsi, Albert Levi:
Data Collection Framework for Energy Efficient Privacy Preservation in Wireless Sensor Networks Having Many-to-Many Structures. Sensors 10(9): 8375-8397 (2010) - 2009
- [j9]Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin:
Public key cryptography based privacy preserving multi-context RFID infrastructure. Ad Hoc Networks 7(1): 136-152 (2009) - [j8]Albert Levi, Can Berk Güder:
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. Comput. Secur. 28(3-4): 105-120 (2009) - 2007
- [j7]Ali Inan, Selim Volkan Kaya, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi:
Privacy preserving clustering on horizontally partitioned data. Data Knowl. Eng. 63(3): 646-666 (2007) - 2006
- [j6]Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak:
Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 5(8): 1074-1086 (2006) - 2004
- [j5]Albert Levi, M. Ufuk Çaglayan, Çetin Kaya Koç:
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure. ACM Trans. Inf. Syst. Secur. 7(1): 21-59 (2004) - 2003
- [j4]Albert Levi:
How secure is secure Web browsing? Commun. ACM 46(7): 152 (2003) - 2001
- [j3]Albert Levi, Çetin Kaya Koç:
Risks in email security. Commun. ACM 44(8): 112 (2001) - 1999
- [j2]Barath Raghavan, Y.-G. Kim, T.-Y. Chuang, B. Madhavan, Albert Levi:
A gigabyte-per-second parallel fiber optic network interface for multimedia applications. IEEE Netw. 13(1): 20-28 (1999) - [j1]Albert Levi, M. Ufuk Çaglayan:
Analytical Performance Evaluation of Nested Certificates. Perform. Evaluation 36-37(1-4): 213-232 (1999)
Conference and Workshop Papers
- 2024
- [c60]Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, Orçun Çetin, A. Selcuk Uluagac:
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All...". USENIX Security Symposium 2024 - 2021
- [c59]Artrim Kjamilji, Albert Levi, Erkay Savas, Osman Berke Güney:
Secure Matrix Operations for Machine Learning Classifications Over Encrypted Data in Post Quantum Industrial IoT. ISNCC 2021: 1-8 - [c58]Faik Kerem Örs, Mustafa Aydin, Aysu Bogatarkan, Albert Levi:
Scalable Wi-Fi Intrusion Detection for IoT Systems. NTMS 2021: 1-6 - 2020
- [c57]Beste Seymen, Duygu Karaoglan Altop, Albert Levi:
Augmented Randomness for Secure Key Agreement using Physiological Signals. CNS 2020: 1-9 - [c56]Sinem Gur, Simge Demir, Sevval Simsek, Albert Levi:
Secure and Privacy-Aware Gateway for Home Automation Systems. SIN 2020: 7:1-7:10 - [c55]N. Mine Tülek, Müge Kuskon, Idil Sezgin, Albert Levi:
Disclosure of Personal Information in Passwords on Social Media. SIU 2020: 1-4 - 2019
- [c54]Laleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi:
SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation. CODASPY 2019: 351-362 - [c53]Halit Alptekin, Can Yildizli, Erkay Savas, Albert Levi:
TRAPDROID: Bare-Metal Android Malware Behavior Analysis Framework. ICACT 2019: 664-671 - 2018
- [c52]Ömer Mert Candan, Albert Levi, Cengiz Togay:
Generating One-Time Keys for Secure Multimedia Communication. ICC Workshops 2018: 1-6 - 2017
- [c51]Duygu Karaoglan Altop, Albert Levi, Volkan Tuzcu:
SU-PhysioDB: A physiological signals database for body area network security. BlackSeaCom 2017: 1-6 - [c50]Ömer Mert Candan, Albert Levi:
Robust Two-factor smart card authentication. BlackSeaCom 2017: 1-5 - [c49]Duygu Karaoglan Altop, Albert Levi, Volkan Tuzcu:
Feature-level fusion of physiological parameters to be used as cryptographic keys. ICC 2017: 1-6 - 2016
- [c48]Cengiz Togay, Albert Levi:
WebRTC based augmented secure communication. SIU 2016: 1621-1624 - 2015
- [c47]Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi:
Secure key agreement using pure biometrics. CNS 2015: 191-199 - [c46]Naim Alperen Pulur, Duygu Karaoglan Altop, Albert Levi:
A Role and Activity Based Access Control for Secure Healthcare Systems. ISCIS 2015: 93-103 - [c45]Duygu Karaoglan Altop, Albert Levi, Volkan Tuzcu:
Towards using physiological signals as cryptographic keys in Body Area Networks. PervasiveHealth 2015: 92-99 - [c44]Ece Egemen, Emre Inal, Albert Levi:
Mobile malware classification based on permission data. SIU 2015: 1529-1532 - 2013
- [c43]Merve Sahin, Albert Levi:
Dynamic key ring update mechanism for Mobile Wireless Sensor Networks. BlackSeaCom 2013: 39-44 - [c42]Süleyman Kardas, Serkan Celik, Muhammed Ali Bingöl, Albert Levi:
A New Security and Privacy Framework for RFID in Cloud Computing. CloudCom (1) 2013: 171-176 - [c41]Osman Kiraz, Albert Levi:
Maintaining trajectory privacy in mobile wireless sensor networks. CNS 2013: 401-402 - [c40]Salim Sarimurat, Albert Levi:
HaG: Hash graph based key predistribution scheme for multiphase wireless sensor networks. ICC 2013: 2079-2083 - [c39]Onur Catakoglu, Albert Levi:
Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks. ISCIS 2013: 359-368 - [c38]Süleyman Kardas, Serkan Çelik, Atakan Arslan, Albert Levi:
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer. LightSec 2013: 130-141 - 2012
- [c37]Ahmet Onur Durahim, Ismail Fatih Yildirim, Erkay Savas, Albert Levi:
Performance Evaluation of Different CRL Distribution Schemes Embedded in WMN Authentication. ISCIS 2012: 333-342 - [c36]Süleyman Kardas, Serkan Çelik, Mehmet Sariyüce, Albert Levi:
A secure and private RFID authentication protocol based on quadratic residue. SoftCOM 2012: 1-6 - 2011
- [c35]Hayretdin Bahsi, Albert Levi:
Preserving organizational privacy in intrusion detection log sharing. CyCon 2011: 1-14 - [c34]Kevser Karaca, Albert Levi:
Resilient key establishment for mobile sensor networks. DCOSS 2011: 1-6 - [c33]Tansu Alpcan, Albert Levi, Erkay Savas:
Digital Trust Games: An Experimental Study. GameSec 2011: 182-200 - [c32]Belal Amro, Yücel Saygin, Albert Levi:
PA-CTM: privacy aware collaborative traffic monitoring system using autonomous location update mechanism. SPRINGL 2011: 1-8 - [c31]Oya Simsek, Albert Levi:
A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks. ISCIS 2011: 157-163 - [c30]Süleyman Kardas, Albert Levi, Ertugrul Murat:
Providing Resistance against Server Information Leakage in RFID Systems. NTMS 2011: 1-7 - [c29]Belal Amro, Albert Levi, Yücel Saygin:
CoRPPS: Collusion Resistant Pseudonym Providing System. SocialCom/PASSAT 2011: 1056-1063 - 2010
- [c28]Tansu Alpcan, Cengiz Örencik, Albert Levi, Erkay Savas:
A game theoretic model for digital identity and trust in online communities. AsiaCCS 2010: 341-344 - [c27]Belal Amro, Yücel Saygin, Albert Levi:
P2-CTM: privacy preserving collaborative traffic monitoring. SPRINGL 2010: 55-59 - [c26]Duygu Karaoglan, Albert Levi, Erkay Savas:
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. Q2SWinet 2010: 11-18 - [c25]Murat Ergun, Albert Levi:
Using combined keying materials for key distribution in wireless sensor networks. PIMRC 2010: 2603-2608 - 2009
- [c24]Hayretdin Bahsi, Albert Levi:
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks. CSA 2009: 1-8 - [c23]Ahmet Onur Durahim, Albert Levi:
Dynamic Resiliency Analysis of Key Predistribution in Wireless Sensor Networks. ICC 2009: 1-6 - [c22]Murat Ergun, Albert Levi, Erkay Savas:
A resilient key predistribution scheme for multiphase wireless sensor networks. ISCIS 2009: 375-380 - [c21]Kübra Kalkan, Sinem Yilmaz, Omer Zekvan Yilmaz, Albert Levi:
A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. Q2SWinet 2009: 29-36 - 2008
- [c20]Abdülhakim Ünlü, Albert Levi:
Two-Tier, Location-Aware and Highly Resilient Key Predistribution Scheme for Wireless Sensor Networks. BCS Int. Acad. Conf. 2008: 355-366 - [c19]Mahir Can Doganay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi:
Distributed privacy preserving k-means clustering with additive secret sharing. PAIS 2008: 3-11 - [c18]Kevser Karaca, Albert Levi:
Towards a framework for security analysis of multiple password schemes. EUROSEC 2008: 16-21 - [c17]Ömer Zekvan Yilmaz, Albert Levi, Erkay Savas:
Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes. ICETE (Selected Papers) 2008: 180-198 - [c16]Omer Zekvan Yilmaz, Albert Levi, Erkay Savas:
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. SECRYPT 2008: 136-144 - [c15]E. Onur Turgay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi:
Disclosure Risks of Distance Preserving Data Transformations. SSDBM 2008: 79-94 - 2007
- [c14]Abdülhakim Ünlü, Önsel Armagan, Albert Levi, Erkay Savas, Özgür Erçetin:
Key Predistribution Schemes for Sensor Networks for Continuous Deployment Scenario. Networking 2007: 239-250 - [c13]Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin:
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. Networking 2007: 263-274 - 2006
- [c12]Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi:
Privacy Preserving Clustering on Horizontally Partitioned Data. ICDE Workshops 2006: 95 - [c11]Cagil Can Oniz, Erkay Savas, Albert Levi:
An optimistic fair e-commerce protocol for large e-goods. ISCN 2006: 214-219 - 2005
- [c10]Cagil Can Oniz, Sinan Emre Tasçi, Erkay Savas, Özgür Erçetin, Albert Levi:
SeFER: secure, flexible and efficient routing protocol for distributed sensor networks. EWSN 2005: 246-255 - [c9]Cagil Can Oniz, Erkay Savas, Albert Levi:
A Fair Multimedia Exchange Protocol. ISCIS 2005: 342-351 - 2004
- [c8]Albert Levi, Mahmut Özcan:
Practical and Secure E-Mail System (PractiSES). ADVIS 2004: 410-419 - [c7]Serdar Sancak, Erdal Cayirci, Vedat Coskun, Albert Levi:
Sensor wars: detecting and defending against spam attacks in wireless sensor networks. ICC 2004: 3668-3672 - [c6]Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan:
Relay Attacks on Bluetooth Authentication and Solutions. ISCIS 2004: 278-288 - 2003
- [c5]Albert Levi, Erkay Savas:
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol. ISCC 2003: 1245-1250 - 2001
- [c4]Albert Levi, Çetin Kaya Koç:
CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59. ACSAC 2001: 286-295 - [c3]Albert Levi, Çetin Kaya Koç:
Reducing Certificate Revocating Cost using NPKI. SEC 2001: 51-60 - 2000
- [c2]Albert Levi, M. Ufuk Çaglayan:
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. S&P 2000: 203-214 - 1999
- [c1]Albert Levi, Mehmet Ufuk Çaglayan:
Verification of classical certificates via nested certificates and nested certificate paths. ICCCN 1999: 242-247
Parts in Books or Collections
- 2005
- [p1]Burak Bayoglu, Albert Levi, Erkay Savas:
Performance Evaluation of End-to-End Security in Wireless Applications using WTLS Handshake Protocol. New Trends in Computer Networks 2005
Editorship
- 2012
- [e3]Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally:
5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6 [contents] - 2011
- [e2]Albert Levi, Peng Liu, Refik Molva:
4th International ICST Conference on Security and Privacy in Communication Networks, SECURECOMM 2008, Istanbul, Turkey, September 22-25, 2008. ACM 2011, ISBN 978-1-60558-241-2 [contents] - 2006
- [e1]Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy, Yücel Saygin:
Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings. Lecture Notes in Computer Science 4263, Springer 2006, ISBN 3-540-47242-8 [contents]
Informal and Other Publications
- 2021
- [i2]Harun Oz, Ahmet Aris, Albert Levi, A. Selcuk Uluagac:
A Survey on Ransomware: Evolution, Taxonomy, and Defense Solutions. CoRR abs/2102.06249 (2021) - 2017
- [i1]Osman Biçer, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Albert Levi:
Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates. IACR Cryptol. ePrint Arch. 2017: 415 (2017)
Coauthor Index
aka: Duygu Karaoglan Altop
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint