A framework for analyzing RFID distance bounding protocols G Avoine, MA Bingöl, S Kardaş, C Lauradoux, B Martin Journal of Computer Security 19 (2), 289-317, 2011 | 149 | 2011 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 110* | 2018 |
Privacy-friendly Authentication in RFID Systems: On Sub-linear Protocols based on Symmetric-key Cryptography G Avoine, MA Bingol, X Carpent, SB Yalcin IEEE Transactions on Mobile Computing (TMC) 12 (10), 2037-2049, 2012 | 71 | 2012 |
A novel RFID distance bounding protocol based on physically unclonable functions S Kardaş, MS Kiraz, MA Bingöl, H Demirci RFID. Security and Privacy: 7th International Workshop, RFIDSec 2011 …, 2012 | 70 | 2012 |
A new security and privacy framework for RFID in cloud computing S Kardas, S Celik, MA Bingöl, A Levi 2013 IEEE 5th international conference on cloud computing technology and …, 2013 | 32 | 2013 |
Optimal security limits of RFID distance bounding protocols O Kara, S Kardaş, MA Bingöl, G Avoine Radio Frequency Identification: Security and Privacy Issues: 6th …, 2010 | 31 | 2010 |
An efficient 2-party private function evaluation protocol based on half gates MA Bingöl, O Biçer, MS Kiraz, A Levi The Computer Journal 62 (4), 598-613, 2019 | 24 | 2019 |
Highly efficient and re-executable private function evaluation with linear complexity O Biçer, MA Bingöl, MS Kiraz, A Levi IEEE Transactions on Dependable and Secure Computing 19 (2), 835-847, 2020 | 21* | 2020 |
Anonymous RFID authentication for cloud services MA Bingol, F Birinci, S Kardaş, MS Kiraz international journal of information security science 1 (2), 32-42, 2012 | 21* | 2012 |
DKEM: Secure and efficient distributed key establishment protocol for wireless mesh networks DK Altop, MA Bingöl, A Levi, E Savaş Ad Hoc Networks 54, 53-68, 2017 | 15 | 2017 |
k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions S Kardaş, S Çelik, MA Bingöl, MS Kiraz, H Demirci, A Levi Wireless Communications and Mobile Computing 15 (18), 2150-2166, 2015 | 11 | 2015 |
A formal framework for cryptanalyzing rfid distance bounding protocols G Avoine, MA Bingol, S Kardas, C Lauradoux, B Martin This work is partially funded by FP7-Project ICE under the grant agreement, 2009 | 11 | 2009 |
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude S Kardaş, MS Kiraz, MA Bingöl, F Birinci Security and Communication Networks 9 (18), 5051-5063, 2016 | 7 | 2016 |
Deploying OSK on low-resource mobile devices G Avoine, MA Bingöl, X Carpent, S Kardaş Radio Frequency Identification: Security and Privacy Issues 9th …, 2013 | 7 | 2013 |
Security and privacy analysis of recently proposed ecc-based rfid authentication schemes A Arslan, MA Bingöl Cryptology ePrint Archive, 2022 | 5 | 2022 |
Efficient and secure schemes for private function evaluation MA Bingöl | 5 | 2019 |
Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment A Arslan, MA Bingöl Cryptology ePrint Archive, 2021 | 4 | 2021 |
Norwegian Internet Voting Protocol Revisited: Security and Privacy Enhancements MA Bingol, F Birinci, S Kardas, MS Kiraz International Conference BulCrypt, Sofia, Bulgaria, 2012 | 4 | 2012 |
Attacks on a mutual authentication scheme conforming to EPCglobal Class-1 Generation-2 RFID systems S Kardas, MA Bingöl Proceedings of the 4th International Conference on Information Security and …, 2009 | 3 | 2009 |
Security analysis of RFID authentication protocols based on symmetric cryptography and implementation of a forward private scheme MA Bingöl Master’s thesis, Istanbul Technical University, Istanbul, Turkey, 2012 | 1 | 2012 |