Author of the publication

Environmental Authentication in Malware.

, , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yener, Bülent
add a person with the name Yener, Bülent
 

Other publications of authors with the same name

Biologically-driven cell-graphs for breast tissue grading., , , , and . ISBI, page 137-140. (2013)Contention-free MAC protocols for asynchronous wireless sensor networks., , , and . Distributed Computing, 21 (1): 23-42 (2008)Flow Trees: A Lower Bound Computation Tool with Applications to Rearrangeable Multihop Lightwave Network Optimization., and . J. High Speed Networks, 4 (1): 99-113 (1995)Algorithms for provisioning virtual private networks in the hose model., , , and . IEEE/ACM Trans. Netw., 10 (4): 565-578 (2002)Graph Theoretic and Spectral Analysis of Enron Email Data., , and . Computational & Mathematical Organization Theory, 11 (3): 265-281 (2005)Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes., , , and . Mathematical Systems Theory, 25 (1): 23-36 (1992)A Novel Performance Analysis for the Copy Network in a Multicast ATM Switch., , , and . ICCCN, page 99-106. IEEE Computer Society, (1998)Quantifying contribution and propagation of error from computational steps, algorithms and hyperparameter choices in image classification pipelines., , and . CoRR, (2019)Privacy-Preserving Information Markets for Computing Statistical Data., , and . Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 32-50. Springer, (2009)Algorithms for provisioning virtual private networks in the hose model., , , and . SIGCOMM, page 135-146. ACM, (2001)