Show all

1.

Oscar Bautista, Kemal Akkaya, Soamar Homsi

Outsourcing Secure MPC to Untrusted Cloud Environments with Correctness Verification Proceedings Article

In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 178–184, IEEE, 2021.

Abstract | Links | BibTeX | Tags: Secure Computation

2.

Andrew Quijano, Kemal Akkaya

Server-side Fingerprint-Based Indoor Localization Using Encrypted Sorting Proceedings Article

In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 53–57, IEEE, 2019.

Abstract | Links | BibTeX | Tags: Secure Computation

3.

Samet Tonyali, Kemal Akkaya, Nico Saputro, A Selcuk Uluagac

A reliable data aggregation mechanism with homomorphic encryption in smart grid ami networks Proceedings Article

In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 550–555, IEEE, 2016.

Abstract | Links | BibTeX | Tags: Secure Computation

4.

Samet Tonyali, Nico Saputro, Kemal Akkaya, Selcuk Uluagac

A reliable data aggregation mechanism with fully homomorphic encryption in smart grid AMI networks Journal Article

In: 2016.

Abstract | Links | BibTeX | Tags: Secure Computation

5.

Patrick Armengol, Rachelle Tobkes, Kemal Akkaya, Bekir S Çiftler, Ismail Güvenç

Efficient privacy-preserving fingerprint-based indoor localization using crowdsourcing Proceedings Article

In: 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 549–554, IEEE, 2015.

Abstract | Links | BibTeX | Tags: Secure Computation

6.

Samet Tonyali, Nico Saputro, Kemal Akkaya

Assessing the feasibility of fully homomorphic encryption for smart grid ami networks Proceedings Article

In: 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 591–596, IEEE, 2015.

Abstract | Links | BibTeX | Tags: Secure Computation

7.

Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya

Implementation and analysis of Dutch-style sealed-bid auctions computational vs unconditional security Proceedings Article

In: 2015 International Conference on Information Systems Security and Privacy (ICISSP), pp. 1–8, IEEE, 2015.

Abstract | Links | BibTeX | Tags: Secure Computation

8.

Nico Saputro, Kemal Akkaya

Performance evaluation of smart grid data aggregation via homomorphic encryption Proceedings Article

In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2945–2950, IEEE, 2012.

Abstract | Links | BibTeX | Tags: Secure Computation

Citations: 18671

h-index: 54

i10-index: 162