Muhammed Ali Bingol
Muhammed Ali Bingol
Senior Lecturer in Cyber Security at De Montfort University
Verified email at - Homepage
Cited by
Cited by
A framework for analyzing RFID distance bounding protocols
G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin
Journal of Computer Security 19 (2), 289-317, 2011
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography
G Avoine, MA Bingol, X Carpent, SB Yalcin
IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049, 2012
A novel RFID distance bounding protocol based on physically unclonable functions
S Kardaş, MS Kiraz, MA Bingöl, H Demirci
RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012
Optimal security limits of RFID distance bounding protocols
O Kara, S Kardaş, MA Bingöl, G Avoine
Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010
A new security and privacy framework for RFID in cloud computing
S Kardas, S Celik, MA Bingöl, A Levi
2013 IEEE 5th international conference on cloud computing technology and …, 2013
An efficient 2-party private function evaluation protocol based on half gates
MA Bingöl, O Biçer, MS Kiraz, A Levi
The Computer Journal 62 (4), 598-613, 2019
Anonymous RFID authentication for cloud services
MA Bingol, F Birinci, S Kardaş, MS Kiraz
international journal of information security science 1 (2), 32-42, 2012
Highly efficient and re-executable private function evaluation with linear complexity
O Biçer, MA Bingöl, MS Kiraz, A Levi
IEEE Transactions on Dependable and Secure Computing 19 (2), 835-847, 2020
DKEM: Secure and efficient distributed key establishment protocol for wireless mesh networks
DK Altop, MA Bingöl, A Levi, E Savaş
Ad Hoc Networks 54, 53-68, 2017
A formal framework for cryptanalyzing rfid distance bounding protocols
G Avoine, MA Bingol, S Kardas, C Lauradoux, B Martin
IACR Crypt. ePrint Arch 543, 2009, 2009
k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
S Kardaş, S Çelik, MA Bingöl, MS Kiraz, H Demirci, A Levi
Wireless Communications and Mobile Computing 15 (18), 2150-2166, 2015
Deploying OSK on low-resource mobile devices
G Avoine, MA Bingöl, X Carpent, S Kardaş
Radio Frequency Identification: Security and Privacy Issues 9th …, 2013
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude
S Kardaş, MS Kiraz, MA Bingöl, F Birinci
Security and Communication Networks 9 (18), 5051-5063, 2016
Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements
MA Bingol, F Birinci, S Kardas, MS Kiraz
International Conference BulCrypt, Sofia, Bulgaria, 2012
Security and privacy analysis of recently proposed ecc-based rfid authentication schemes
A Arslan, MA Bingöl
Cryptology ePrint Archive, 2022
Efficient and secure schemes for private function evaluation
MA Bingöl
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment
A Arslan, MA Bingöl
Cryptology ePrint Archive, 2021
Attacks on a mutual authentication scheme conforming to EPCglobal Class-1 Generation-2 RFID systems
S Kardas, MA Bingöl
Proceedings of the 4th International Conference on Information Security and …, 2009
Security analysis of RFID authentication protocols based on symmetric cryptography and implementation of a forward private scheme
MA Bingöl
Master’s thesis, Istanbul Technical University, Istanbul, Turkey, 2012
The system can't perform the operation now. Try again later.
Articles 1–20