Author of the publication

Bootstrapping security associations in opportunistic networks.

, , and . PerCom Workshops, page 147-152. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Önen, Melek
add a person with the name Önen, Melek
 

Other publications of authors with the same name

Privacy and confidentiality in context-based and epidemic forwarding., , and . Computer Communications, 33 (13): 1493-1504 (2010)TREDISEC: Towards Realizing a Truly Secure and Trustworthy Cloud., , and . ERCIM News, (2016)Publicly verifiable conjunctive keyword search in outsourced databases., , , and . CNS, page 619-627. IEEE, (2015)Analysis of Privacy in Online Social Networks from the Graph Theory Perspective., , and . GLOBECOM, page 1-5. IEEE, (2011)A Cloud Accountability Policy Representation Framework., , , , , , , , and . CLOSER, page 489-498. SciTePress, (2014)Safebook: A distributed privacy preserving Online Social Network., , and . WOWMOM, page 1-3. IEEE Computer Society, (2011)FHE-Compatible Batch Normalization for Privacy Preserving Deep Learning., and . DPM/CBT@ESORICS, volume 11025 of Lecture Notes in Computer Science, page 389-404. Springer, (2018)A Leakage-Abuse Attack Against Multi-User Searchable Encryption., , and . IACR Cryptology ePrint Archive, (2017)From Regulatory Obligations to Enforceable Accountability Policies in the Cloud., , , , , , , , and . CLOSER (Selected Papers), volume 512 of Communications in Computer and Information Science, page 134-150. Springer, (2014)Adversarial Classification under Gaussian Mechanism: Calibrating the Attack to Sensitivity., and . CoRR, (2022)