A framework for analyzing RFID distance bounding protocols G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin Journal of Computer Security 19 (2), 289-317, 2011 | 150 | 2011 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 98 | 2018 |
A novel RFID distance bounding protocol based on physically unclonable functions S Kardaş, MS Kiraz, MA Bingöl, H Demirci RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 75 | 2012 |
PUF-enhanced offline RFID security and privacy S Kardaş, S Celik, M Yıldız, A Levi Journal of Network and Computer Applications 35 (6), 2059-2067, 2012 | 74 | 2012 |
New event detection and topic tracking in Turkish F Can, S Kocberber, O Baglioglu, S Kardas, HC Ocalan, E Uyar Journal of the American Society for Information Science and Technology 61 (4 …, 2010 | 73 | 2010 |
Examination of a new defense mechanism: Honeywords ZA Genc, S Kardaş, MS Kiraz Information Security Theory and Practice: 11th IFIP WG 11.2 International …, 2018 | 62 | 2018 |
Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems S Kardaş, M Akgün, MS Kiraz, H Demirci 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and …, 2011 | 49 | 2011 |
A new security and privacy framework for RFID in cloud computing S Kardas, S Celik, MA Bingöl, A Levi 2013 IEEE 5th international conference on cloud computing technology and …, 2013 | 33 | 2013 |
Optimal security limits of RFID distance bounding protocols O Kara, S Kardaş, MA Bingöl, G Avoine Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 31 | 2010 |
Anonymous RFID authentication for cloud services M Kiraz, M Bingöl, S Kardaş, F Birinci international journal of information security science 1 (2), 32-42, 2012 | 21 | 2012 |
Blokzincir teknolojisi: Uzlaşma protokolleri S Kardaş Dicle Üniversitesi Mühendislik Fakültesi Mühendislik Dergisi 10 (2), 481-496, 2019 | 20 | 2019 |
Bilkent News Portal: A personalizable system with new event detection and tracking capabilities F Can, S Kocberber, O Baglioglu, S Kardas, HC Ocalan, E Uyar Proceedings of the 31st annual international ACM SIGIR conference on …, 2008 | 20 | 2008 |
Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer MS Kiraz, ZA Genç, S Kardaş Security and Communication Networks, 2015 | 19 | 2015 |
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer AL Süleyman Kardaş, Serkan Çelik, Atakan Arslan Lightweight Cryptography for Security and Privacy 8162, 130-141, 2013 | 15* | 2013 |
Providing resistance against server information leakage in RFID systems S Kardaş, A Levi, E Murat 2011 4th IFIP International Conference on New Technologies, Mobility and …, 2011 | 14 | 2011 |
BITCOIN'DE MAHREMİYETİ SAĞLAMA YÖNTEMLERİ S Kardaş, MS Kiraz ULUSLARARASI BİLGİ GÜVENLİĞİ MÜHENDİSLİĞİ DERGİSİ 4 (1), 1-9, 2018 | 13 | 2018 |
Are RNGs achilles’ heel of RFID security and privacy protocols? A Arslan, S Kardaş, SA Çolak, S Ertürk Wireless Personal Communications 100, 1355-1375, 2018 | 13 | 2018 |
A formal framework for cryptanalyzing rfid distance bounding protocols G Avoine, MA Bingol, S Kardas, C Lauradoux, B Martin This work is partially funded by FP7-Project ICE under the grant agreement, 2009 | 12 | 2009 |
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions S Kardaş, S Çelik, MA Bingöl, H Demirci, A Levi Wireless Communications and Mobile Computing, 1-17, 2014 | 11 | 2014 |
New event detection and tracking in Turkish S Kardaş PQDT-Global, 2009 | 10 | 2009 |