Publications (K. Bicakci)

Google Scholar profile
DBLP website

Last updated: August 16, 2013.


Journals

  1. H. Cotuk, K. Bicakci, B. Tavli, E. Uzun, "The Impact of Transmission Power Control Strategies on Lifetime of Wireless Sensor Networks", IEEE Transactions on Computers (to appear).

  2. K. Bicakci, B. Crispo, G. Oligeri, "LAKE: A Server-Side Authenticated Key-Establishment with Low Computational Workload", ACM Transactions on Internet Technology (to appear).

  3. K. Bicakci, I.E. Bagci, B. Tavli, Z. Pala, "Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation", Computer Standards & Interfaces 35(4): 396-402 (2013).

  4. K. Bicakci, Y. Uzun, "A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset", Computers & Security (Elsevier), Volume 31, Number 5, July 2012, pp. 717-726 [doi:10.1016/j.cose.2012.04.002].

  5. K. Bicakci, I. E. Bagci, and B. Tavli. "Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: the case of digital signatures", Information Sciences (Elsevier), Volume 188, 1 April 2012, Pages 44-63.

  6. B. Tavli, K. Bicakci, R. Zilan and J. M. Barcelo. "A Survey of Visual sensor network platforms", Multimedia Tools Appl. 60(3): 689-726 (2012).

  7. K. Bicakci, H. Gultekin, B. Tavli, and I. E. Bagci. "Unobservable wireless sensor networks against global eavesdroppers: lifetime bounds and design guidelines", Computer Standards & Interfaces, Volume 33, Issue 4, June 2011, pp. 401-410 [ doi:10.1016/j.csi.2011.01.001].

  8. K. Bicakci, I. E. Bagci, and B. Tavli, "Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability", IEEE Communications Letters, Volume 15, Issue 2, pp. 205-207, 2011 [doi: 10.1109/LCOMM.2011.010311.101885].

  9. B. Tavli, M. B. Akgun, K. Bicakci, "Impact of limiting number of links on the lifetime of wireless sensor networks", IEEE Communications Letters, Volume 15, Issue 1, pp. 43-45, [doi: 10.1109/LCOMM.2010.01.101846].

  10. B. Tavli, M. M. Ozciloglu, K. Bicakci, "Mitigation of compromising privacy by transmission range control in wireless sensor networks", IEEE Communications Letters, vol. 14, pp. 1104-1106, 2010 [doi: 10.1109/LCOMM.2010.101210.100731].

  11. M. Guerrero-Zapata, R. Zilan, J. M. Barcelo-Ordinas, K. Bicakci, and B. Tavli, "The future of security in wireless multimedia sensor networks: a position paper", Telecommunications Systems, vol. 45, pp. 77-91, 2010.

  12. K. Bicakci, B. Tavli, "Prolonging network lifetime with multi-domain cooperation strategies in wireless sensor networks", Ad Hoc Networks, vol. 8, pp. 582-596, 2010.

  13. K. Bicakci, H. Gultekin, and B. Tavli, "The impact of one-time energy costs on network lifetime in wireless sensor networks", IEEE Communications Letters, vol. 13, pp. 905-907, 2009.

  14. K. Bicakci and B. Tavli, "Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks", Computer Standards & Interfaces, vol. 31, pp. 931-941, 2009.

  15. K. Bicakci, "One-time Proxy Signatures Revisited", Computer Standards and Interfaces (Elsevier), Vol. 29(4), pp. 499-505, May 2007.

  16. K. Bicakci, B. Crispo and A.S. Tanenbaum, "How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification", International Journal of Infonomics, Special Issue on Selected papers of the ACM SAC 2005 TRECK Track, September 2005.

  17. K. Bicakci, Nazife Baykal, "Improved Server Assisted Signatures", Computer Networks (Elsevier), Vol.47(3), pp.351-365, February 2005.

  18. K. Bicakci, G. Tsudik, B. Tung, "How to construct optimal one-time signatures", Computer Networks (Elsevier), Vol.43(3), pp. 339-349, October 2003.

  19. K. Bicakci, N. Baykal, "Improving the Security and Flexibility of One-time Passwords by Signature Chains", Turkish Journal of Electrical Engineering & Computer Sciences (ELEKTRIK), Vol.11(3), 2003.

Conference and workshop papers

  1. M. Akpulat, K. Bicakci, U. Cil. "Revisiting Graphical Paswords for Augmenting, not Replacing, Text Passwords", accepted to ACSAC 2013, 29th Annual Computer Security Applications Conference.

  2. U. Cil, K. Bicakci, "gridWordX: Design, Implementation, and Usability Evaluation of an Authentication Scheme Supporting Both Desktops and Mobile Devices," IEEE MoST 2013 (Mobile Security Technologies workshop), San Francisco, May 2013.

  3. A. Soylev, K. Bicakci, B. Tavli, "Uncovering the Impact of Minimum-Energy Routing on Lifetime of Wireless Sensor Networks", 7th International Workshop on Wireless Sensor, Actuator and Robot Networks (WiSARN 2013-Spring) in conj. with 9th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS'13) May 20-23, Cambridge, Massachusetts, USA.

  4. A. U. Batmaz, B. Tavli, D. Incebacak, K. Bicakci, "Impact of Reverse Path Length of Unidirectional Links on the Lifetime of Wireless Sensor Networks", IEEE International Conference on Communications, ICC 2013, 9-13 June 2013, Budapest, Hungary.

  5. D. Incebacak, K. Bicakci, B. Tavli, "Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks", 5th International Conference on New Technologies, Mobility and Security, NTMS 2012 Istanbul, Turkey, May 7-10, 2012. IEEE 2012, pp. 1-5.

  6. K. Bicakci, N.B. Atalay, H.E. Kiziloz, "Johnny in Internet Café: User Study and Exploration of Password Autocomplete in Web Browsers", 7th ACM Workshop on Digital Identity Management (DIM 2011) in conjunction with ACM CCS 2011, October 21, Chicago, IL, USA.

  7. K. Bicakci, P.C. van Oorschot. "A Multi-Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation", New Security Paradigms Workshop (NSPW 2011), Sept.12-15, Marin County, CA, USA.

  8. K. Bicakci, N.B. Atalay, M. Yuceel, P. C. van Oorschot. "Exploration and Field Study of a Browser-based Password Manager using Icon-based Passwords". 2nd Workshop on Real-Life Cryptographic Protocols and Standardization (RLCPS'11), 4 March 2011, St. Lucia (co-located with FC 2011). Springer LNCS, Proc. of Financial Cryptography and Data Security (FC 2011).

  9. S.A. Unlu, K. Bicakci, "NoTabNab: Protection against the Tabnabbing Attack", 5th APWG eCrime Researchers Summit, IEEE, October 18-20 2010, Dallas, Texas, USA.

  10. D. Incebacak, K. Bicakci, and B. Tavli, "Investigating the Tradeoffs between Spatial Granularity and Energy Requirements in Wireless Sensor Networks", In Proceedings of the European Modeling Symposium, 2010.

  11. K. Bicakci, "Pushing the Limits of One-Time Signatures", In Proc. 2nd International Conference on Security of Information and Networks (SIN 2009), 6-10 October 2009, ACM, Gazimagusa, North Cyprus.

  12. K. Bicakci, N.B. Atalay, M. Yüceel, H. Gürbaslar, B. Erdeniz, "Towards Usable Solutions to Graphical Password Hotspot Problem", In Proc. 4th IEEE International Workshop on Security, Trust, and Privacy for Software Applications (STPSA 2009) in conjunction with COMPSAC 2009, July 20-24 2009, Seattle, Washington, USA.

  13. K. Bicakci, M. Yüceel, B. Erdeniz, H. Gürbaslar, N.B. Atalay, "Graphical Passwords as Browser Extension: Implementation and Usability Study”, In Proc. 3rd IFIP WG 11.11 International Conference on Trust Management, June 15-19, 2009, Purdue University, West Lafayette, USA.

  14. K. Bicakci, "Optimal Discretization for High-Entropy Graphical Passwords", In Proc. 23rd International Symposium on Computer and Information Sciences, IEEE ISCIS 2008, October 27-29, 2008, Istanbul, Turkey.

  15. Y. Uzunay, K. Bicakci, SHA: A Secure Voice Activated Smart Home for Quadriplegia Patients, In Proc. International Workshop on Knowledge Discovery and Management in Health Informatics, The IEEE International Conference on Bioinformatics and Medicine 2007, Silicon Valley, USA, November 2-5, 2007.

  16. Y. Uzunay, D. Incebacak and K. Bicakci, "Towards Trustable Digital Evidence with PKIDEV: PKI based Digital Evidence Verification Model", In Proc. 2nd European Conference on Computer Network Defense, University of Glamorgan, United Kingdom, December 2006.

  17. C. Gamage, K. Bicakci, B. Crispo, and A. S. Tanenbaum, "Security for the Mythical Air-dropped Sensor Network", In Proc. 11th IEEE Symposium on Computers and Communications (ISCC 2006), IEEE Computer Society, June 2006.

  18. K.H. Gulkesen, T. Beyan, H. Gul, K. Bicakci, "Reliability of Health Information on the Turkish Web Sites; Fever in Children at Home", Medical Informatics 2006, Maastricht, Netherlands. European Notes in Medical Informatics, 2006; 2: 433-438.

  19. C. Gamage, J. Leiwo, K. Bicakci, B. Crispo, A.S. Tanenbaum, "A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks", In Proc. 2nd International Conference on Intelligent Sensors, Sensor Networks and Information Processing, December 2005, Melbourne, Australia.

  20. Y. Uzunay, K. Bicakci, "UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet Access", In Proc. of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), IEEE, Computer Society, July 2005.

  21. K. Bicakci, B. Crispo and A.S. Tanenbaum, "How to Incorporate Revocation Status Information into the Trust Metrics for Public-Key Certification”, In Proc. 20th Annual ACM Symposium on Applied Computing, ACM, 2005.

  22. K. Bicakci, C. Gamage, B. Crispo, and A.S. Tanenbaum, "One-Time Sensors: A Novel Concept to Mitigate Node-Capture Attacks”, Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Lecture Notes in Computer Science 3813, Springer, 2005.

  23. K. Bicakci, B. Crispo, A.S. Tanenbaum, "Counting Abuses Using Flexible Off-line Credentials”, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Lecture Notes in Computer Science 3574, Springer, 2005.

  24. K. Bicakci, N. Baykal, "SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing”, Security in Pervasive Computing, Lecture Notes in Computer Science 2802, Springer, 2004.

  25. K. Bicakci, N. Baykal, "A New Design of Privilege Management Infrastructure with Binding Signature Semantics”, Lecture Notes in Computer Science 3093, Springer, 2004.

  26. K. Bicakci, N. Baykal, "Server Assisted Signatures Revisited", Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Lecture Notes in Computer Science 2964, Springer, 2004.

  27. K. Bicakci, N. Baykal, "EVEREST: An Efficient Method for Verification of Digital Signatures in Real-Time Teleradiology", In Proc. 2004 MEDINFO Symposium, Organized by IMIA (International Medical Informatics Association), September 2004, San Francisco, USA.

  28. K. Bicakci, N. Baykal, "One-Time Passwords: Security Analysis using BAN Logic and Integrating with Smartcard Authentication", Lecture Notes in Computer Science 2869, Springer, 2003.

  29. K. Bicakci, N. Baykal, "Design and Performance Evaluation of a Flexible and Efficient Server Assisted Signature Protocol", In Proc. IEEE 8th Symposium on Computers and Communications, June 2003, Antalya, Turkey.

  30. K. Bicakci, N. Baykal, "Infinite Length Hash Chains and Their Applications", In Proc. of IEEE 11th International Workshops on Enabling Technologies (WETICE 2002), June 2002, Pittsburgh, USA.

  31. K. Bicakci, N. Baykal, "Wireless and Mobile Security", In Proc. 5th KES International Conference, KES 2001, September 2001, Japan.

  32. K. Bicakci, B. Tung, G. Tsudik, "On constructing optimal one-time signatures", In Proc. of Fifteenth International Symposium on Computer and Information Sciences, ISCIS 2000, October 2000, Istanbul, Turkey.

Papers in Turkish

  1. A.U. Batmaz, B.Tavli, D. Incebacak, K. Bicakci, "Tek Yönlü Baglanti Tokalasma Atlama Uzunlugunun Kablosuz Algilayici Ag Yasam Süresine Etkileri", SİU 2013, 21. Sinyal İşleme ve İletişim Uygulamaları Kurultayı, 24-26 Nisan 2013, Girne , KKTC.

  2. E. Uzun, A. Aksaç, O. Öztürk, H.E. Kiziloz, D. Incebacak, B.Tavli, K. Bicakci, " Kablosuz Algilayici Aglarda Yasam Süresi Eniyilemesi Ve Yerel Yönlendirme Ödünlesmesi", SİU 2013, 21. Sinyal İşleme ve İletişim Uygulamaları Kurultayı, 24-26 Nisan 2013, Girne , KKTC.

  3. M. Akpulat, K. Bicakci, U. Çil, "Metin ve Grafiksel Ögeleri Birlestiren Yeni bir Parola Tabanli Kimlik Dogrulama Yöntemi", V. International Information Security and Cryptology Conference - ISCTURKEY 2012, Ankara, Turkey, May 17-18, 2012. pp.75-80.

  4. M.B. Akgun, B. Tavli, K. Bicakci, "Kablosuz Algilayici Aglarda Baglanti Sayisinin Sinirlandirilmasinin Ag Ömrü Üzerindeki Etkilerinin İncelenmesi", ELECO 2010, Elektrik-Elektronik ve Bilgisayar Mühendisliği Sempozyumu, 2-5 Aralık 2010, Bursa.

  5. K. Bicakci, "Fundamental Principles for Usable Security", 4. Uluslararasi Bilgi Güvenliği ve Kriptoloji Konferansi, 6-8 Mayıs 2010, Ankara, Turkey.

  6. K. Bicakci, "Reverse SSL: A New Solution for the Performance Problem in SSL Servers”, ABG 2008: 2nd National Network and Information Security Symposium, North Cyprus, May 2008.

  7. K.H. Gulkesen, E. Eray, K. Bicakci, M.K. Balci, "An Evaluation on Technology Use of Diabetic Patients", 4. Academic Informatics Conference, Denizli, Turkey, February 2006.

  8. Y. Uzunay, K. Bicakci, "A3D3M: A Digital Evidence Verification Model Supported with Public Key Infrastructure (In Turkish)", In Proc. ABG 2005: National Network and Information Security Symposium, İstanbul, Turkey, June 2005.

  9. K. Bicakci, "Alternative Digital Signatures", Internet Conference, INET-TR, November 2000, Istanbul, Turkey.

Others

  1. H. E. Kiziloz, K. Bicakci, "SmarTCHA: Insan Hesaplama Kullanarak Olusturulan Erisilebilir ve Kullanisli Insan Etkilesim Ispat Sistemi", ELECO 2012, Elektrik-Elektronik ve Bilgisayar Mühendisligi Sempozyumu, 29 Kasim-1 Aralik 2012, Bursa.

  2. K. Bicakci, N.B. Atalay, M. Yuceel, P.C. van Oorschot, "Exploration and Field Study of a Browser-based Password Manager using Icon-based Passwords", Technical Report TR-11-07 (Jan.21, 2011), School of Computer Science, Carleton University.

  3. K. Bicakci, M. Yuceel, B. Erdeniz, H. Gurbaslar, N.B. Atalay, "Graphical Passwords as Browser Extension: Implementation and Usability Study", In Proc. of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009 (poster).

  4. K. Bicakci, "Optimal Discretization for High-Entropy Graphical Passwords", Cryptology ePrint Archive, Report 2008/178.

  5. K. Bicakci, B. Crispo and A.S. Tanenbaum, "Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes", Cryptology ePrint Archive, Report 2006/212.

  6. K. Bicakci, N. Baykal, "Survivable Authentication for Health Information Systems", Proc. 2003 AMIA Symposium on Computer Applications in Medical Care, November 2003, poster.

  7. K. Bicakci, N. Baykal, "Introduction to Security in Biomedical Informatics", Proc. BIOMED 2003 - 10th Biomedical Science and Technology Symposium, poster.