Security Challenges in Cloud Computing. L Ertaul, S Singhal, G Saldamli Security and Management, 36-42, 2010 | 110 | 2010 |
Novel obfuscation algorithms for software security L Ertaul, S Venkatesh Proceedings of the 2005 International Conference on Software Engineering …, 2005 | 63 | 2005 |
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I) L Ertaul, W Lu International Conference on Research in Networking, 102-113, 2005 | 57 | 2005 |
Security of ad hoc networks and threshold cryptography L Ertaul, N Chavan 2005 International Conference on Wireless Networks, Communications and …, 2005 | 49 | 2005 |
Elliptic curve cryptography based threshold cryptography (ecc-tc) implementation for manets L Ertaul, N Chavan IJCSNS 7 (4), 48, 2007 | 42 | 2007 |
Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms L Ertaul, M Kaur, VAKR Gudise Proceedings of the international conference on wireless networks (ICWN), 66, 2016 | 36 | 2016 |
JHide-A tool kit for code obfuscation. L Ertaul, S Venkatesh IASTED Conf. on Software Engineering and Applications, 133-138, 2004 | 35 | 2004 |
Security Planning Using Zachman Framework for Enterprisesy L Ertaul, R Sudarsanam USA: California State University, California State University, Hayward, 2005 | 28 | 2005 |
Security of software defined networks (SDN) L Ertaul, K Venkatachalam Proceedings of the International Conference on Wireless Networks (ICWN), 24-30, 2017 | 23 | 2017 |
IoT security: Performance evaluation of grain, mickey, and trivium-lightweight stream ciphers L Ertaul, A Woodall Proceedings of the International Conference on Security and Management (SAM …, 2017 | 20 | 2017 |
Analysis of lightweight message authentication codes for IoT environments G Saldamli, L Ertaul, A Shankaralingappa 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC …, 2019 | 19 | 2019 |
Wildfire detection using wireless mesh network G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul 2019 Fourth international conference on fog and mobile edge computing (FMEC …, 2019 | 19 | 2019 |
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs). L Ertaul, V Kedlaya ICWN, 186-192, 2007 | 17 | 2007 |
Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs). L Ertaul, D Ibrahim Security and Management 363, 363, 2009 | 16 | 2009 |
On the generation of x. 509v3 certificates with biometric information G Martınez-Silva, F Rodrıguez-Henrıquez, N Cruz-Cortés, L Ertaul Security and Management, 52-57, 2007 | 16 | 2007 |
The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations. L Ertaul, S Mullapudi ICWN, 3-9, 2009 | 15 | 2009 |
Performance analysis of CLEFIA, PICCOLO, TWINE Lightweight block ciphers in IoT environment L Ertaul, SK Rajegowda Proceedings of the International Conference on Security and Management (SAM …, 2017 | 14 | 2017 |
Securing car data and analytics using blockchain G Saldamli, K Karunakaran, VK Vijaykumar, W Pan, S Puttarevaiah, ... 2020 Seventh International Conference on Software Defined Systems (SDS), 153-159, 2020 | 13 | 2020 |
Applying the kill chain and diamond models to microsoft advanced threat analytics L Ertaul, M Mousa Proceedings of the International Conference on Security and Management (SAM …, 2018 | 13 | 2018 |
Post-Quantum Cryptography on IoT: Merkle's Tree Authentication G Saldamli, L Ertaul, B Kodirangaiah Proceedings of the International Conference on Wireless Networks (ICWN), 35-41, 2018 | 12 | 2018 |