Yay─▒nlar

-A +A
  • UEKAE YAYINLARI

  • An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Makale Sahipleri: A. C. Atici, C. Yilmaz, E. Savas
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 74-83
    Y─▒l─▒: 2013

    Random number generation using field programmable analog array implementation of logistic map
    Makale Sahipleri: Cicek, I.; Pusane, A.E.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 2013 21st Signal Processing and Communications Applications Conference (SIU), ┬á, vol., no., pp.1,4
    Y─▒l─▒: 24-26 Nisan 2013

    Field programmable analog array implementation of logistic map
    Makale Sahipleri: Cicek, I.; Pusane, A.E.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 2013 21st Signal Processing and Communications Applications Conference (SIU), ┬á, vol., no., pp.1,4
    Y─▒l─▒: 24-26 Nisan 2013

    A novel design method for discrete time chaos based true random number generators
    Makale Sahipleri: Cicek, I.; Pusane, A.E.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: Integration, the VLSI Journal, Available online, ISSN 0167-9260,┬áhttp://dx.doi.org/10.1016/j.vlsi.2013.06.003┬á(in press).
    Y─▒l─▒: 1 Temmuz 2013

    A chaos based integrated jitter booster for true random number generators
    Makale Sahipleri: Cicek, I.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 2013 21th IEEE European Conference on Circuit Theory and Design (ECCTD), ┬á, vol., no., pp.1-4
    Y─▒l─▒: 08-12 Sep. 2013

    A novel dual entropy core true random number generator Cicek
    Makale Sahipleri: Pusane, A.E.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 2013 8th International Conference on Electrical and Electronics Engineering (ELECO), ┬ávol., no., pp.1-4
    Y─▒l─▒: 28-30 Nov. 2013

    Multi-Coset Sampling and Reconstruction of Signals: Exploiting Sparsity in Spectrum Monitoring
    Makale Sahipleri: Çelebi H. B., Durak-Ata, L., Çelebi H.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: European Signal Processing Conference (EUSIPCO) 2013, Morocco
    Y─▒l─▒: 2013

    Breaking the Spacing Based Authentication Protocol
    Makale Sahipleri: I. Erguler, S. Aktas, E. Anarim, G. Saldamli
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: Information Journal, 16 (3A) 1793-1804
    Y─▒l─▒: 2013

    An Analysis TooltoEvaluateEffect of Retransmissions on SIP Server Overloading
    Makale Sahipleri: D. Yava┼č, ─░. H├Âkelek, B. G├╝nsel
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: NGMAST
    Y─▒l─▒: 2013

    Trade-off Analysis of QoS-Aware Configurable LTE Downlink Schedulers
    Makale Sahipleri: ├ľ. F. Gemici, ─░. H├Âkelek, H. A. ├ç─▒rpan
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 20th International Conference on Telecommunications
    Y─▒l─▒: ICT 2013

    Interoperability of Secure VoIP Terminals
    Makale Sahipleri: R. T.K├╝y├╝k, H. B. ├çelebi, ─░.H├Âkelek, ├ľ. ├ľren, A. Yeni, A.Sar─▒budak, F. Kara, G.V─▒c─▒l
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: 1st International Black Sea Conference on Communications and Networking
    Y─▒l─▒: 2013

    Trade-off Analysis of Multi Topology Routing Based IP FastRerouteMechanisms
    Makale Sahipleri: S. Cevher, M. Uluta┼č, ─░.H├Âkelek
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: The 16th IEEE International Global Internet Symposium (GI 2013)
    Y─▒l─▒: 2013

    T├ťB─░TAK B─░LGEM Kablosuz ─░leti┼čim Teknolojileri Ara┼čt─▒rma Laboratuar─▒ (K─░TAL)
    Makale Sahipleri: ─░.H├Âkelek, H. B. ├çelebi, R. T.K├╝y├╝k, O. Ert├╝rk, F. Kara, G. V─▒c─▒l
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: IEEE SIU
    Y─▒l─▒: 2013

    ├çoklu Y├Ânlendirme Konfig├╝rasyonlar─▒n─▒n Performans Degerlendirmesi
    Makale Sahipleri: S. Cevher, M. Ulutas, ─░.H├Âkelek
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: IEEE SIU
    Y─▒l─▒: 2013

    VoIP Terminalleri i├žin Birlikte ─░┼člerlik Test Otomasyon Sistemi
    Makale Sahipleri: R. T.K├╝y├╝k, H. B. ├çelebi, ─░.H├Âkelek, ├ľ. ├ľren, A. Yeni, A.Sar─▒budak, F. Kara, G.V─▒c─▒l
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: IEEE SIU
    Y─▒l─▒: 2013

    A cross-layer goodput enhancement considering CRC codingand ARQ Dynamics
    Makale Sahipleri: E. ├ťst├╝nel, ─░. H├Âkelek, ├ľ. ─░leri
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: Symposium onComputersand Communications (ISCC)
    Y─▒l─▒: 2013

    A formal role-based access control model for security policies in multi-domain mobile networks
    Makale Sahipleri: Devrim Unal, Mehmet Ufuk Çaglayan
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: Computer Networks 57 (1): 330-350
    Y─▒l─▒: 2013

    Spatiotemporal model checking of location and mobility related security policy specifications
    Makale Sahipleri: Devrim Unal, Mehmet Ufuk Çaglayan
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒: Turk. J. Elec. Eng. & Comp. Sci 144-173.
    Y─▒l─▒: (2013)

    A feasibility study of a 1D chaotic map for True Random Number Generation
    Makale Sahipleri: Cicek, I.; Pusane, A.E.; Dundar, G.
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒:┬á2012 20th Signal Processing and Communications Applications Conference (SIU), , vol., no., pp.1,4
    Yılı: 18-20 Nisan 2012

    Unbalanced States Violates RFID Privacy
    Makale Sahipleri: I. Erguler, S. Aktas, E. Anarim, G. Saldamli
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒:┬áJournal of Intelligent Manufacturing, 10.1007/s10845-012-0655-4
    Yılı: 2012

    Security Analysis of an Ultra-lightweight RFID Authentication Protocol SLMAP*
    Makale Sahipleri: I. Erguler, C. Unsal, E. Anarim
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒:┬áSecurity and Communication Networks, 5 (3) 287ÔÇô291
    Yılı: 2012

    Flaws in a Recent RFID Delegation Protocol
    Makale Sahipleri: I. Erguler,  E. Anarim
    Bas─▒ld─▒─č─▒ Yay─▒n Ad─▒:┬áSecurity ", Personal and Ubiquitous Computing, 16 (3) 337-349
    Yılı: 2012