2023
L. Ertaul, A. Chauhan, ‘IoT Security: Implementation of Xtea,
Simon/Speck Lightweight Block Ciphers’, The 2023 World Congress in Computer
Science, Computer Engineering and Applied Computing (CSCE'23), The 2023
International Conference on Security and Management (SAM'23), July, Las Vegas,
2023
2022 G. Saldamli, A.S. Papetla, A. Sedasivan, A. Deshmukh, S. Madanambeti, L. Ertaul, " Drug Recommendation and Tracking using Blockchain and Machine Learning', The 2022 World Congress in Computer Science, Computer Engineering and Applied Computing (CSCE'22), The 2022 International Conference on Security and Management (SAM'22), July, Las Vegas, 2022
2021 Gokay, Saldamli,
Joseph Jojo, Gunakara Nayak Mitra, Mathur Sushant, Jayapraksh Sidharth, Levent
Ertaul, "Secure
Location-Based Contact Tracing for COVID-19", The 2021 World Congress in Computer Science,
Computer Engineering, and Applied Computing (CSCE'21), The 2021 International
Conference on Security and Management (SAM'21 ), July, Las Vegas, 2021.
2021 Gokay Saldamli,
Doshi Nishit, Gadapa Vishal, Parikh Jainish, Patel Mihir, Levent
Ertaul, "Analysis of Machine Learning as a Service",
The
17th International Conference on Grid, Cloud, & Cluster Computing, GCC'21:
July 26-29, 2021, USA
2020
Gokay Saldamli, Aditya Doshatti, Darshil Kapadia, Devashish
Nyati,Maulin Bodiwala, and Levent Ertaul, "Enterprise Backend as a Service (EBaaS)",
The 16th International Conference on Grid, Cloud, & Cluster Computing,
GCC'20: July 27-30, 2020, USA
2020 Varick L. Erickson,
Pragya Varshney, Levent Ertaul, "A Project-Based Approach to Teaching IoT ", The 16th
International Conference on Frontiers in Education:Computer Science &
Computer Engineering (STEM, ABET, ...), FECS'20: July 27-30, 2020, USA
2020 Gokay Saldamli, Kavitha Karunakaran, Vidya Kodihalli Vijaykumar, Weiyang Pan,
Siddesh Puttarevaiah and Levent Ertaul, "Securing Car Data and Analytics using Blockchain", Second
International Workshop on Blockchain Applications and Theory (BAT2020), Paris France,
April 20-23
2019
L. Ertaul, P. Chudinov, B.
Morales, "IoT Security: Authenticated Lightweight Key Exchange
(ALIKE)", The 2019 World
Congress in Computer Science, Computer Engineering, and Applied Computing
(CSCE'19), The 18th Int'l Conf on
Wireless Networks (ICWN'19), July, Las Vegas, 2019.
2019
G. Saldamli,
L. Ertaul and A. M. Shankaralingappa. "Analysis of
Lightweight Message Authentication Codes for IoT Environments.",
The 5th IEEE International Workshop on Internet of Things: Networking
Applications and Technologies (IoTNAT'19), June 10-13, Rome, Italy.
2019
G. Saldamli,
S. S. Deshpande, K. Jawalekar, P. Gholap, L. Ertaul and L. Tawalbeh.
"Wild-Fire Detection Using
Wireless Mesh Networks.", The 5th IEEE International Workshop on Internet
of Things: Networking Applications and Technologies (IoTNAT'19), June 10-13,
Rome, Italy.
2019
G. Saldamli,
H. Sanjeeva, K. Siddalingaapa,
R. V. Murugesan and L. Ertaul,
"A Secure Collaborative
Module on Distributed SDN Controllers Security.", The 10th IEEE
International Conference on Information and Communication Systems (ICICS'19),
June 11-13, Jordan
2019
G. Saldamli,
L. Ertaul, K Dholakia and U Sanikommu, "An Efficient Private Matching and Set Intersection
Protocol: Implementation PM-Malicious Server.", The 2019 World Congress in Computer Science,
Computer Engineering, and Applied Computing (CSCE'19), The 2019 International
Conference on Security and Management (SAM'19), July, Las Vegas, 2019.
2019 G. Saldamli, L. Ertaul and Mayur Gala, "Privacy-preserving Contacts Compare for Social Networks.", The 2019 World Congress in Computer Science, Computer Engineering, and Applied Computing (CSCE'19), The 18th Int'l Conf on Wireless Networks (ICWN'19), July, Las Vegas, 2019.
2018
L. Ertaul, M. Mousa, "Applying the Kill Chain and Diamond Models to Microsoft
Advanced Threat Analytics", The 2018 World
Congress in Computer Science, Computer Engineering, and Applied Computing
(CSCE'18), The 2018 International Conference on Security and Management
(SAM'18), July, Las Vegas, 2018.
2018
G. Saldamli, L. Ertaul, B. Kodirangaiah, "Post-Quantum Cryptography on IoT: Merkle's Tree Authentication", The 2018 World
Congress in Computer Science, Computer Engineering, and Applied Computing
(CSCE'18), The 17th Int'l Conf on Wireless Networks
(ICWN'18), July, Las Vegas, 2018
2018
G. Saldamli,
L. Ertaul, K. M. A. Menon, "Analysis of McEliece Post Quantum
Cryptosystem on Raspberry Pi 3", The 2018 World Congress in Computer
Science, Computer Engineering, and Applied Computing (CSCE'18), The 2018
International Conference on Security and Management (SAM'18), July, Las Vegas,
2018.
2017 BOOK:
K. Daimi, G. Francia, L. Ertaul, E. El-Sheikh,
L. Hernandez, "Computer and
Network Security Essentials", June 2017.
2017 L. Ertaul, A. Woodall, "IoT
Security: Performance Evaluation of Grain, MICKEY, and Trivium - Lightweight
Stream Ciphers", The 2017 World Congress in Computer Science,
Computer Engineering, and Applied Computing (CSCE'17), The 2017 International
Conference on Security and Management (SAM'17), July, Las Vegas, 2017.
2017
L. Ertaul, S. K. Rajegowda, "Performance
Analysis of CLEFIA, PICCOLO, TWINE Lightweight Block Ciphers in IoT environment",
The 2017 World Congress in Computer Science, Computer Engineering, and Applied
Computing (CSCE'17), The 2017 International Conference on Security and
Management (SAM'17), July, Las Vegas, 2017.
2017
L. Ertaul, K. Venkatachalam,"Security
of Software Defined Networks (SDN)", The 2017 World
Congress in Computer Science, Computer Engineering, and Applied Computing
(CSCE'17), The 16th Int'l Conf on Wireless Networks
(ICWN'17), July, Las Vegas, 2017.
2017 L. Ertaul, "Privacy in Location Based Services (LBS) via Composite Functions: The L4NE Protocol", IJCSNS International Journal of Computer Science and Network Security, Vol. 17, No.3, pp. 117-123 March.
2016 L. Ertaul, I. Thanki, "EasyAuth - Implementation of a Multi-Factor Authentication Scheme based on Sound, Fingerprint and One Time Passwords (OTP)", WORLDCOMP 2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016.
2016 L. Ertaul, M. Kaur, V. A. K. R Gudise, "Implementation and Performance Analysis of PBKDF2, Bcrypt, Scrypt Algorithms", The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016.
2016 L. Ertaul, N. V. Konda, D. G Ramasamy, "Implementation of EAX Mode of Operation within a Real-Time Android Chatting Application", The 2016 International Conference on Wireless Networks, ICWN16, July, Las Vegas, 2016.
2016 L. Ertaul, A. Mudan, N. Sarfaraz, "Performance Comparison of AES-CCM and AES-GCM Authenticated Encryption Modes", WORLDCOMP 2016, International Conference on Security and Management SAM'16, July, Las Vegas, 2016.
2016 L. Ertaul, S. K L, N. Sanka, "Implementation of Authenticated Encryption Algorithm Offset Code Book (OCB)", The 2016 International Conference on Wireless Networks, ICWN16, July, Las Ve gas, 2016.
2015 G. Saldamli,
Y. J. Baek, L. Ertaul, "Partially
Interleaved Modular Karatsuba-Ofman Multiplication",
IJCSNS
International Journal of Computer Science and Network Security, Vol. 15, No. 5, pp. 44-49, May.
2015 L. Ertaul, W.
M. Baptista, R. Maram, "Storing Credit Card Information Securely using
Shamir Secret Sharing in a Multi-Provider Cloud Architecture", WORLDCOMP2015,
The 2015 International Conference on Security and Management SAM'15, July, Las
Vegas.
2015 L. Ertaul, J.
H. Yang, G. Salsamli, "Analyzing
Homomorphic Encryption Schemes in Securing Wireless Sensor Networks (WSN)"
IJCSNS
International Journal of Computer Science and Network Security, Vol. 15,No. 5, pp. 1-11, May.
2015 L. Ertaul, J.
N. Shah, S. Ammar, "A Comparison of HMAC-based and AES-based FFX mode of
Operation for Format-Preserving Encryption", WORLDCOMP2015, The
2015 International Conference on Security and Management SAM'15, July, Las
Vegas.
2015 L. Ertaul, Saleha
Shakoor, "Implementation of
Pinkas Partial Matching (PM)-semi honest protocol using Mixed Multiplicative
Homomorphic encryption (MMH) for Location Based Services (LBS)", IJCSNS
International Journal of Computer Science and Network Security, Vol. 15 No. 3 pp.
1-10, March.
2014 L. Ertaul, A.
M. Mehta, T. K. Wu, "Implementation of Oblivious Bloom Intersection in Private
Set Intersection Protocol (PSI)", Proceedings of the 2014 Internatioanl Conference on Security & Management
SAM'14, July, Las Vegas.
2013 L. Ertaul, B.
F. Imagnu, S. Kilaru, "Privacy-Aware
Proximity Based Service using Hide & Crypt Protocol: Implementation",
WORLDCOMP2013, The 2013 International Conference on Security and Management
SAM'13, July, Las Vegas.
2013 L. Ertaul, A
Balluru, A. Perumalsamy, "Private Proximity Testing For
Location Based Services", WORLDCOMP2013, The 2013
International Conference on Security and Management SAM'13, July, Las Vegas.
2013 L. Ertaul, N.
Shaikh, S. Kotipalli, "Implementation of Boneh Protocol 3 in Location Based Services (LBS) to
Provide Proximity Services", WORLDCOMP2013, The 2013
International Conference on Security and Management SAM'13, July, Las Vegas.
2013 Y. Martirosyan, L.
Ertaul, "Security Evaluation of Web Application
Vulnerability Scanners' Strengths and Limitations Using Custom Web Application",
M.Sc. Thesis, California State University East Bay, February.
2012 L. Ertaul, Y.
Martirosyan, "Implementation of a WEB Application for Evaluation of WEB
Application Security Scanners", Proceedings of the 2012 Internatioanl Conference on Security & Management
SAM'12, July, Las Vegas.
2012 L. Ertaul, V.
Rathod, "The
Zachman Framework, the Owner's Perpective &
Security", Proceedings of the 2012 Internatioanl
Conference on Security & Management SAM'12, July, Las Vegas.
2011 L. Ertaul, S. Vandana,
K. Gulati, G. Saldamli, "Enterprise Security Planning using the Zachman
Framework - Builder's Perspective", Proceedings of Security
and Management SAM'11, July, Las Vegas.
2011 L. Ertaul, A.
R. Pasham, H. Patel, "Enterprise Security Planning
using Zachman Framework: Designer's Perspective", Proceedings
of Security and Management SAM'11, July, Las Vegas.
2011 L. Ertaul, A Movasseghi, S. Kumar, "Enterprise Security
Planning with TOGAF-9", Proceedings of Security and Management
SAM'11, July, Las Vegas.
2011 L. Ertaul, A Movasseghi, S. Kumar,
"A Strategy for Information Security:TOGAF", Proceedings of Security and Management
SAM'11, July, Las Vegas.
2011 L. Ertaul, J.
Hao, "Enterprise
Security Planning with Department of Defense Architecture Framework (DODAF)",
Proceeddings of Security and Management SAM'11, July,
Las Vegas.
2010 L.Ertaul,
2010 L.Ertaul,
S.
Natte, G.
Saldamli, "Security Evaluation of
CDMA2000",
WORLDCOMP2010, The 2010 International Conference on Wireless Networks ICWN'10,
July,
2010 L. Ertaul, S. Chelivendri, G. Saldamli, "Security Issues for Mobile
Government", WORLDCOMP2010, The 2010 International
Conference on Security and Management SAM'10, July,
2010 B. Karaoglan,
L. Ertaul, "A Practice in
using E-Portfolio in a Higher Education Course Taught at Distance", Journal
of Electronics and Electrical Engineering, No:6(102), ISSN 1392 - 1215, June
2010 B. Karaoglan,
L. Ertaul, "A Practice in using E-Portfolio
in a Higher Education Course Taught at Distance", European Association
for Education in Electrical and Information Engineering Council (EAEEIE) annual conference, 28-30 June,Palagna, Lithuania.
2009 L. Ertaul, D.
Ibrahim, "Evaluation of Secure Routing Protocols in Mobile
Ad Hoc Networks (MANETs)", The 2009 International Conference on
Security and Management SAM'09, July,
2009 L. Ertaul, S. Mullapudi, "The Security Problems of Vehicular Ad Hoc Networks
(VANETs) and Proposed Solutions in Securing their Operations", The
2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas.
2009 L. Ertaul, O. Catambay, "Today and Tomorrow: IEEE 802.11 WLAN
Security", The 2009
International Conference on Security and Management SAM'09, July,
2009 L. Ertaul, M. Ganta, "Security in Wireless Sensor Networks - A Study",The 2009 International
Conference on Wireless Networks ICWN'09, July,
2008 L. Ertaul, J.
H. Yang, "Implementation of Domingo Ferrer's a New Privacy
Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN)", The
2008 Applied Cryptology and Network Security (ACNS08),
July, Las Vegas.
2008 L. Ertaul, E. Celebi, M. Gozutok, "Implementation of
Montgomery Multiplication Algorithms in Machine Languages", The
2008 Applied Cryptology and Network Security (ACNS08),
July,
2008 J. H. Yang, L.
Ertaul, "Performance,
Feasibility & Scalibility of Hommorphic
Encryption Schemes in Securing Wireless Sensor Networks", M.Sc Thesis, California State University, East Bay, May.
2007 L. Ertaul, Vaidehi, "Implementation
of Homomorphic Encryption Schemes for Secure Packet Forwarding in Mobile Ad Hoc
Networks (MANETs)", IJCSNS
International Journal of Computer Science and Network Security, VOL. 7 No. 11 pp.
132-141, November.
2007 L. Ertaul, Vaidehi, "Computing Aggregation
Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless
Sensor Networks (WSNs)",
The 2007 International Conference on Wireless Networks, ICWN'07, June,
2007 Vaidehi,
L. Ertaul, "Applications of Homomorphic Encryption Schemes to
Provide Security in Computer Networks, Wireless Sensor Networks (WSN) and
Wireless Mobile Ad Hoc Networks (MANETS)"
2007 L. Ertaul, N.
Chavan, "RSA and Elliptic Curve- ElGamal Threshold Cryptography
(ECCEG-TC) Implementations for Secure Data Forwarding in MANETs", The 2007 International Conference on
Security & Management, SAM'07, June, Las Vegas
2007 E. Cuervo, F.
Henriquez, D. Arroyo, L. Ertaul, "A PDA Implementation of an
Off-line e-Cash Protocol", The 2007 International
Conference on Applied Cryptography & Network Security, ACNS07, June,
2007 G. Silva, F.
Henriquez, N. Cortes , L. Ertaul, "On the Generation of X.509v3
Certificates with Biometric Information", The 2007
International Conference on Security & Management, SAM'07, June,
2007 J. Panda, L.Ertaul, "Mobile Agent Security", M.Sc.
Thesis,
2007 L. Ertaul, N. Chavan, "Elliptic Curve Cryptography based Threshold
Cryptography (ECC-TC) Implementation for MANETs", IJCSNS
International Journal of Computer Science and Network Security,
VOL.7 No.4, page 48-61 April .
2006 L.Ertaul,
Vaidehi, "Finding
Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer
Networks", The
2006 International Conference on Security & Management, SAM'06, June,
2006 L. Ertaul, J. Panda, "Mobile Agent Security", The 2006 International
Conference on Security & Management,
SAM'06, June, Las Vegas
2006 L. Ertaul, B. Kasim, "GSM
Security II", The
2006 International Conference on Wireless Networks, ICWN'06, June
2005 L. Ertaul, R. Sudarsanam, "Security Planning Using
Zachman Framework for Enterprises", Proceedings of EURO mGOV
2005 (The First European Mobile Government Conference), July, University of
Sussex, Brighton, UK.
2005 L. Ertaul, T. Braithwaite,
B. L. Bellman, "Enterprise Security
Planning (ESP)", Proceedings of
EURO mGOV 2005 (The First European Mobile Government
Conference), July, University of Sussex, Brighton, UK.
2005 L. Ertaul, S. Venkatesh, "Novel Obfuscation Algorithms for Software Security", Proceedings of the 2005 International Conference on
Software Engineering Research and Practice, SERP'05, June, Las Vegas
2005 L. Ertaul, B. Kasim, "GSM Security", Proceedings of
the 2005 International Conference on Wireless Networks, ICWN'05, June, Las
Vegas
2005 L. Ertaul, N. Chavan, "Security of Ad Hoc Networks and Threshold Cryptography", 2005 International Conference on Wireless Networks,
Communications, and Mobile Computing, Wirelesscom
2005, MobiWac 2005, June 2005, Maui, Hawaii
2005 L. Ertaul, W. Lu, "ECC based Threshold Cryptography for Secure Data Forwarding
and Secure Key Exchange in Mobile Ad Hoc Networks (MANET) I", Proc. of Networking
2005 International Conference, May 2005, University of
Waterloo, Ontario, CA
2005 L. Ertaul, A. Akyol, "E-Commerce and Security", Journal
of
2004 S. Venkatesh, L. Ertaul, "JHIDE-A
Tool Kit for Code Obfuscation", M.Sc. Thesis,
2004 L. Ertaul, S. Venkatesh,
"JHide-A Tool
Kit for Code Obfuscation", Proc. of IASTED International Confrerence on Software Engineering and Applications (SEA
2004), Nov. 2004, MIT Cambridge, USA. Download JHide tool kit http://www.mcs.csueastbay.edu/~lertaul/JHide/
2001 L. Ertaul, M. Afyonluoglu, "Personal Computer
Security" BAS 2001, Proc.
of the 6th Symposium on Computer Networks,
2000 L. Ertaul, B. Yilmaz, "Software Implementation of the SkipJack Algorithm", ISCIS
XV, Proceedings of the 15th International Sciences, October ,
2000 L. Ertaul, L. Ozalp,
"Survey and Evaluation of Security Products", Internal
Report,
2000 L. Ertaul, A. Tekin,
"Security of Mobile Agents", ISCIS
XV, Proceedings of the 15th International Sciences, October, Istanbul
2000 L. Ertaul, A.Z. Alkar, H.S. Gecim, R. Sonmez, "A VLSI
Implemantation of DES and Triple DES with Pipelining
Technique", MUG Conference, Portland,
Oregon, USA , October.
2000 L. Ertaul, B. Kasım, "Evaluation of GSM
Security", BAS'2000, Proc. of the 5th Symposium on Computer
Networks,
2000 A. Botan , L. Ertaul, "An Investigation of ATM Forum Security Spesifications and a Multi-Layer ATM Security Model for
TCP/IP over ATM (MLASM-t)", PhD Thesis,
1999 L. Ertaul, B. Kasım, M.
Gozutok, I.C. Baykal, T.
Koprulu, "Software Optimization Methods for the
Implementation of RC2, RC4 and RC5 Security Algorithms", Proc. of the
Fourth Symposium on Computer Networks, İstanbul, May.
1999 L. Ertaul,
1999 L. Ertaul, S.
Ceylan, "
Speed Optimized Software Implementation of Blowfish in ANSI C ", ISCIS
XIV, Proceedings of The Fourteenth International Sciences, October , Kusadasi.
1999 L. Ertaul, A. Işıklı, "The Evalution of Firewall Authentication
Protocols", BAS98, Proc. of the Third Symposium on Computer Networks,
İzmir, June
1998 L. Ertaul, M. Gozutok, C. Baykal, T. Koprulu, "An RSA Implementation in Software", BAS98, Proc. of the Third Symposium on Computer Networks, İzmir
June.
1998 L. Ertaul, C.
Baykal, M. Gozutok, T. Koprulu,
"Speed Optimized Implementation of
IDEA in ANSI C", BAS'98, Proc. of the Third Symposium on Computer
Networks,
1998 L. Ertaul, T.
Koprulu, S. Kondakci, H. Caglar, O. Ergul, C. Baykal, M. Gozutok , A. Genc, S.Guven, K. Ince, "INTERCEPTOR: Design of a Firewall", BAS'98, Proc. of the Third
Symposium on Computer Networks, Izmir, June. (in Turkish)
1998 L. Ertaul, T.
Goksu, "Yer Degistirmeli, Aktarmali ve Dizi sifreleyiciler icin Turkcenin Yapisal Ozelliklerini Kullanan bir Kriptoanaliz",
BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June. (in
Turkish)
1996 L. Ertaul,
"Security Access Control Scheme
(SACS) for Computer Networks", BAS96, Proc. of the First Symposium on Computer
Networks, Istanbul, May.
1996 L. Ertaul,
"A Solution to the Re-Blocking
Problem in the Implementation of Improved Internet Security Access Control
Scheme (IISACS)", BAS96, Proc. of the First Symposium on Computer
Networks,
1994 L. Ertaul,
"A Software Implementation of
an Internet Security Access Control Scheme (ISACS) Through TCP/IP Protocols",
Ph.D. Thesis, University of Sussex, England.
1994 L. Ertaul,
M.J. English, F.S.F. Poon, "Distribution
and Management of Secret Sequence Numbers for Large Computer Networks in an
Internet Security Access Control Scheme", Proc. of the 9th
Int. Symp. on Computer and Information Sciences,
November, Antalya.
1993 L. Ertaul,
M.J. English, F.S.F. Poon, "Improved
Session Initiation Authentication Protocols in Internet Access Control
Scheme", Proc. of the 2nd Int. Conf. on Computer
Communications and Networks, San Diego, California, USA, June.
1993 L.Ertaul, M.J. English, F.S.F. Poon,
"Performance of Improved Session
Initiation Authentication (SIA) Protocols", Proc. of 5th
Bangor Symp. on Communications, Bangor, England,
June.
1992
L. Ertaul,
M.J. English, F.S.F. Poon, "Improvements to Internet
Access Control Security Scheme", I.E.E. Electronics
Letters, Vol:28, No:13, page 1250-1251, June.
1992 L. Ertaul,
M.J. English, F.S.F. Poon, "A
TCP/IP Implementation of an Internet Security Access Control Scheme",
Proc. of 4th Bangor Symp. on
Communications, Bangor, England, May.
1987 L. Ertaul, "Spread Spectrum Haberleşme
Sistemi Modellemesi",
Hacettepe University Press.
1987 L. Ertaul, "Modelling
of Spread Spectrum Communications Sysytem
(DS-QPSK)", TMMOB Elektrik Muhendisliği, Vol: 32.
1986 L. Ertaul, T. Cifcibasi, "Microprocessors and their
Industrial Applications", Lecture Notes, SEGEM Ankara & Ereğli, 103 pages, 1986