Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Baris Celiktas"'
Publikováno v:
IEEE Access, Vol 12, Pp 70568-70580 (2024)
This study introduces a hierarchical key assignment scheme (HKAS) based on the closest vector problem in an inner product space (CVP-IPS). The proposed scheme offers a comprehensive solution with scalability, flexibility, cost-effectiveness, and high
Externí odkaz:
https://doaj.org/article/0d7b75e0697f41d7babe4e4f21cc4de4
Publikováno v:
IEEE Access, Vol 9, Pp 107347-107359 (2021)
In this work, we construct a key access management scheme that seamlessly transitions any hierarchical-like access policy to the digital medium. The proposed scheme allows any public cloud system to be used as a private cloud. We consider the data ow
Externí odkaz:
https://doaj.org/article/943325014ede4b47b85b5418795f59e3
An inner product space-based hierarchical key assignment/access control scheme is presented in this work. The proposed scheme can be utilized in any cloud delivery model where the data controller implements a hierarchical access control policy. In ot
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb821655ef878ebaa9ba235ca2f70dea
https://doi.org/10.36227/techrxiv.16896199.v1
https://doi.org/10.36227/techrxiv.16896199.v1
Autor:
Mevlut Serkan Tok, Baris Celiktas
Publikováno v:
Bilişim Teknolojileri Dergisi. 12:253-263
Macros are consisted of instructions and commands mainly used to automate tasks, embed functionality and provide customization of Microsoft Office documents. However, they have been exploited by malicious hackers by creating malware since they were i
Publikováno v:
2019 4th International Conference on Computer Science and Engineering (UBMK).
In this work, we construct a cloud-independent protocol which allows any public cloud system to be used as the private. While designing the protocol, we aim to provide both more secure mechanism as the private cloud and the advantages of the public c
Man in the Middle (MITM) attack is aimed at seizing data between two nodes. The ARP Spoofing/Poisoning technique is a technique frequently used by attackers which allows MITM attacks to be carried out on local area networks (LANs). The attack exploit
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::71ab825c689a42ab31f451479de61f77