2012 journal article

BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for securelogging in resource-constrained systems

ACM Transactions on Information and System Security, 15(2).

By: A. Yavuz, P. Ning & M. Reiter

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Self-sustaining, efficient and forward-secure cryptographic constructions for unattended wireless sensor networks

Ad Hoc Networks, 10(7), 1204–1220.

By: A. Yavuz & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption

Turkish Journal of Electrical Engineering and Computer Sciences, 18(1), 1–21.

By: A. Yavuz, F. Alagoz & E. Anarim

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems

25th Annual Computer Security Applications Conference, 219–228.

By: A. Yavuz & P. Ning

Source: NC State University Libraries
Added: August 6, 2018