Mehmet Sabir Kiraz
Mehmet Sabir Kiraz
Senior Lecturer and Programme Leader of Cyber Security, De Montfort University, UK
Verified email at
Cited by
Cited by
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
MY Kubilay, MS Kiraz, HA Mantar
Computers & Security 85, 333-352, 2019
A protocol issue for the malicious case of Yao’s garbled circuit construction
M Kiraz, B Schoenmakers
27th Symposium on Information Theory in the Benelux, 283-290, 2006
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFIDSec 2011- 7th International Workshop, 78-93, 2012
Still Wrong Use of Pairings in Cryptography
MS Kiraz, O Uzunkol
Elsevier-Applied Mathematics and Computation 333, 467–479, 2018
Examination of a New Defense Mechanism: Honeywords.
ZA Genc, S Kardas, MS Kiraz
Springer-Verlag WISTP 2017, IACR Cryptology ePrint Archive 2013, 696, 2013
Policy specification and verification for blockchain and smart contracts in 5G networks
D Unal, M Hammoudeh, MS Kiraz
ICT Express 6 (1), 43-47, 2020
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
MS Kiraz, O Uzunkol
International Journal of Information Security, 1-19, 2015
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
S Kardaş, M Akgün, MS Kiraz, H Demirci
2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011
THRIVE: Threshold Homomorphic encryption based secure and privacy preserving bIometric VErification system
C Karabat, MS Kiraz, H Erdogan, E Savas
EURASIP Journal on Advances in Signal Processing Editorial Team, 2015
A Comprehensive Meta- Analysis of Cryptographic Security Mechanisms for Cloud Computing
MS Kiraz
Journal of Ambient Intelligence and Humanized Computing, 1-30, 2016
Secure and Fair Two-Party Computation
MS Kiraz
Proc. of EUROCRYPT 3, 2008
Efficient committed oblivious transfer of bit strings
MS Kiraz, B Schoenmakers, J Villegas
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
An efficient protocol for fair secure two-party computation
MS Kiraz, B Schoenmakers
Cryptographers’ Track at the RSA Conference, 88-105, 2008
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
O Biçer, MA Bingöl, MS Kiraz, A Levi 62 (4), 598–613, 2019
Highly Efficient and Re-executable Private Function Evaluation with Linear Complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 2020 ( …, 2020
Anonymous RFID authentication for cloud services
M Kiraz, M Bingöl, S Kardaş, F Birinci
international journal of information security science 1 (2), 32-42, 2012
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer
MS Kiraz, ZA Genç, S Kardaş
Security and Communication Networks, 2015
Secure database in cloud computing-cryptdb revisited
Z Dayıoğlu
International Journal of Information Security Science 3 (1), 129-147, 2014
Bitcoin'de mahremiyeti sağlama yöntemleri
S Kardaş, M KİRAZ
Uluslararası Bilgi Güvenliği Mühendisliği Dergisi 4 (1), 1-9, 2018
Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures
MS AlMarshoud, AH Al-Bayatti, MS Kiraz
Vehicular Communications 36, 100490, 2022
The system can't perform the operation now. Try again later.
Articles 1–20