Zobrazeno 1 - 10
of 110
pro vyhledávání: '"Bicakci, Kemal"'
Autor:
Cagal, Mustafa, Bicakci, Kemal
Despite being legally equivalent to handwritten signatures, Qualified Electronic Signatures (QES) have not yet achieved significant market success. QES offer substantial potential for reducing reliance on paper-based contracts, enabling secure digita
Externí odkaz:
http://arxiv.org/abs/2408.14349
The challenge of achieving passwordless user authentication is real given the prevalence of web applications that keep asking passwords. Complicating this issue further, in an enterprise environment, a single sign-on (SSO) service is often maintained
Externí odkaz:
http://arxiv.org/abs/2310.05222
Autor:
Bicakci, Kemal, Uzunay, Yusuf
Operating system and browser support that comes with the FIDO2 standard and the biometric user verification options increasingly available on smart phones has excited everyone, especially big tech companies, about the passwordless future. Does a drea
Externí odkaz:
http://arxiv.org/abs/2211.07161
Autor:
Ozbay, Abdullah, Bicakci, Kemal
Android devices are equipped with many pre-installed applications which have the capability of tracking and monitoring users. Although applications coming pre-installed pose a great danger to user security and privacy, they have received little atten
Externí odkaz:
http://arxiv.org/abs/2203.10583
Publikováno v:
In Computers & Security April 2024 139
Autor:
Tekin, Salih, Bicakci, Kemal, Mersin, Ozgur, Erdem, Gulnur Neval, Canbay, Abdulkerim, Uzunay, Yusuf
Publikováno v:
Journal of Quality in Maintenance Engineering, 2022, Vol. 29, Issue 2, pp. 338-355.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/JQME-01-2022-0009
The F-layout was introduced in 1955 and eventually enforced as a national standard as a replacement to the popular QWERTY keyboard layout in Turkey. In a more recent work, another alternative (E-layout) was developed for Turkish language and argued t
Externí odkaz:
http://arxiv.org/abs/1905.11791
With the advent of cloud technologies, there is a growing number of easy-to-use services to store files and share them with other cloud users. By providing security features, cloud service providers try to encourage users to store personal files or c
Externí odkaz:
http://arxiv.org/abs/1606.04705
Autor:
Uzunay, Yusuf, Bicakci, Kemal
Authentication proxies, which store users' secret credentials and submit them to servers on their behalf, offer benefits with respect to security of the authentication and usability of credential management. However, as being a service that is not in
Externí odkaz:
http://arxiv.org/abs/1511.05682
Significant portion of contemporary computer users are children, who are vulnerable to threats coming from the Internet. To protect children from such threats, in this study, we investigate how successfully typing data can be used to distinguish chil
Externí odkaz:
http://arxiv.org/abs/1511.05672