Kemal Bıçakcı

|

Home |

Publications

Short Bio

Blog

CV

 

 

Last updated: August 23, 2011.

2011 Publications:

 

1.       K. Bicakci, N.B. Atalay, H.E. Kiziloz, "Johnny in Internet Café: User Study and Exploration of Password Autocomplete in Web Browsers", 7th ACM Workshop on Digital Identity Management (DIM 2011) in conjunction with ACM CCS 2011, October 21, Chicago, IL, USA. Author's copy.

2.       K. Bicakci, P.C. van Oorschot. "A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation", New Security Paradigms Workshop (NSPW 2011), Sept.12-15, Marin County, CA, USA. Author's copy.

3.       K. Bicakci, I. E. Bagci, and B. Tavli, “Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures,” Information Sciences (Elsevier), revised in August 2011.

4.       B. Tavli, K. Bicakci, R. Zilan and J. M. Barcelo, “A Survey of Visual sensor network platforms,” Multimedia Tools and Applications, accepted, 2011. Author's copy.

5.       Kemal Bicakci, Nart Bedin Atalay, Mustafa Yuceel, Paul C. van Oorschot. "Exploration and Field Study of a Browser-based Password Manager using Icon-based Passwords". 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS'11), 4 March 2011, St. Lucia (co-located with FC 2011). Springer LNCS (to appear), Proc. of Financial Cryptography and Data Security (FC 2011). Author's copy.

6.       Kemal Bicakci, Hakan Gultekin, Bulent Tavli and Ibrahim Ethem Bagci, "Maximizing Lifetime of Event-Unobservable Wireless Sensor Networks", Computer Standards and Interfaces (Elsevier), accepted, 2011Author's copy.

7.       Kemal Bicakci, Ibrahim Ethem Bagci, and Bulent Tavli, "Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability", IEEE Communication Letters, accepted, 2011. Author's copy.

8.       Bulent Tavli, M. Burak Akgun, and Kemal Bicakci, "The Impact of Limiting the Number of Links on the Lifetime of Wireless Sensor Networks", IEEE Communication LettersVol. 15, No. 1, January 2011. Author's copy.

 


2010 Publications:

 

1.       M. Burak Akgun, Bulent Tavli and Kemal Bicakci, "Kablosuz Algılayıcı Ağlarda Bağlantı Sayısının Sınırlandırılmasının Ağ Ömrü Üzerindeki Etkilerinin İncelenmesi", ELECO 2010, Elektrik-Elektronik ve Bilgisayar Mühendisliği Sempozyumu, 2-5 Aralık 2010, Bursa. 

2.       Bulent Tavli, M. Mikail Ozciloglu, and Kemal Bicakci, “Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks”, IEEE Communication Letters, Vol. 14, No. 12, December 2010.

3.       Kemal Bicakci, Bulent Tavli, “Prolonging Network Lifetime with Multi-domain Cooperation Strategies in Wireless Sensor Networks”, Ad Hoc Networks (Elsevier), Vol 8 (6), pp. 582-596, August 2010.

4.       Manel Guerrero-Zapata, Ruken Zilan, Jose M. Barcelo Ordinas, Kemal Bicakci, Bulent Tavli, “The Future of Security in Wireless Multimedia Sensor Networks: A position paper”, Telecommunication Systems (Springer), Vol 45 (1), pp. 77-91, September 2010.

5.       Kemal Bıçakcı, "Kullanışlı Güvenlik için Temel Prensipler", 4. Uluslararası Bilgi Güvenliği ve Kriptoloji Konferansı, 6-8 Mayıs 2010, Ankara, Turkey.

6.       Seckin Anil Unlu, Kemal Bicakci, NoTabNab: Protection against the Tabnabbing Attack, 5th APWG eCrime Researchers Summit, IEEE, October 18-20 2010, Dallas, Texas, USA.

7.       Davut İncebacak, Kemal Bicakci, Bulent Tavli, "Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks", European Modelling Symposium (EMS 2010), November 17-19, 2010, Pisa, Italy.


2009 Publications:

 

1.       Kemal Bicakci, Hakan Gultekin, Bulent Tavli, “The Impact of One-Time Energy Costs on Network Lifetime in Wireless Sensor Networks”, IEEE Communication Letters, Vol. 13 (12), pp. 905-907, December 2009.

2.       Kemal Bicakci, Bulent Tavli, “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks”, Computer Standards and Interfaces (Elsevier), Volume 31, Issue 5, September 2009, Pages 931-941.

3.       Kemal Bicakci, Nart Bedin Atalay, Mustafa Yüceel, Hakan Gurbaslar, Burak Erdeniz, “Towards Usable Solutions to Graphical Password Hotspot Problem”, In Proc. 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009) in conjunction with COMPSAC 2009, July 20-24 2009, Seattle, Washington, USA.

4.       Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay, “Graphical Passwords as Browser Extension: Implementation and Usability Study”, In Proc. Third IFIP WG 11.11 International Conference on Trust Management, June 15-19, 2009, Purdue University, West Lafayette, USA.

5.     Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar, Nart Bedin Atalay, “Graphical Passwords as Browser Extension: Implementation and Usability Study, In Proc. of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 (poster).

6.     K.Bicakci, "Pushing the Limits of One-Time Signatures", In Proc. 2nd International Conference on Security of Information and Networks (SIN 2009), 6-10 October 2009, ACM, Gazimagusa, North Cyprus.


Key Publications in Earlier Work:

  • Kemal Bicakci, “One-time Proxy Signatures Revisited”, Computer Standards and Interfaces (Elsevier), Vol. 29(4), pp. 499-505, May 2007.
  • Kemal Bicakci, Nazife Baykal, “Improved Server Assisted Signatures”, Computer Networks (Elsevier), Vol.47(3), pp.351-365, February 2005.
  • Kemal Bicakci, Gene Tsudik, Brian Tung, “How to construct optimal one-time signatures”, Computer Networks (Elsevier), Vol.43(3), pp. 339-349, October 2003.
  • Kemal Bicakci, Chandana Gamage, Bruno Crispo, and Andrew Tanenbaum, “One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks”, Lecture Notes in Computer Science 3813, Springer, 2005.
  • Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum, “Counting Abuses Using Flexible Off-line Credentials”, Lecture Notes in Computer Science 3574, Springer, 2005.
  • Kemal Bicakci, Nazife Baykal, “SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing”, Security in Pervasive Computing, Lecture Notes in Computer Science 2802, Springer, 2004.
  • Kemal Bicakci, Nazife Baykal, “A New Design of Privilege Management Infrastructure with Binding Signature Semantics”, Lecture Notes in Computer Science 3093, Springer, 2004.
  • Kemal Bicakci, Nazife Baykal, “Server Assisted Signatures Revisited”, Lecture Notes in Computer Science 2964, Springer, 2004.
  • Kemal Bicakci, Nazife Baykal, “One-Time Passwords: Security Analysis using BAN Logic and Integrating with Smartcard Authentication”, Lecture Notes in Computer Science 2869, Springer, 2003.
  • Kemal Bicakci, Nazife Baykal, “Improving the Security and Flexibility of One-time Passwords by Signature Chains”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol.11(3), 2003.
  • Kemal Bicakci, Bruno Crispo and Andrew Tanenbaum, “How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification”, International Journal of Infonomics, Special Issue on Selected papers of the ACM SAC 2005 TRECK Track, September 2005.
  • Kemal Bicakci, “Optimal Discretization for High-Entropy Graphical Passwords”, 23rd International Symposium on Computer and Information Sciences, IEEE ISCIS 2008, October 27-29, 2008, Istanbul, Turkey.
  • Chandana Gamage, Kemal Bicakci, Bruno Crispo, and Andrew S. Tanenbaum, “Security for the Mythical Air-dropped Sensor Network”, Proc. 11th IEEE Symposium on Computers and Communications (ISCC 2006), IEEE Computer Society, June 2006.
  • Kemal Bicakci, Nazife Baykal, “EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology”, Proc. 2004 MEDINFO Symposium, Organized by IMIA (International Medical Informatics Association), September 2004, San Francisco, USA.
  • Kemal Bicakci, Nazife Baykal, “Infinite Length Hash Chains and Their Applications”, Proc. of IEEE 11th International Workshops on Enabling Technologies (WETICE 2002), June 2002, Pittsburgh, USA.

 

Note: The articles are copyrighted by the respective publishers and may be downloaded only for personal use.