Levent Ertaul
Levent Ertaul
Professor of Computer Science, CSU East Bay
Verified email at - Homepage
Cited by
Cited by
Security Challenges in Cloud Computing.
L Ertaul, S Singhal, G Saldamli
Security and Management, 36-42, 2010
Novel obfuscation algorithms for software security
L Ertaul, S Venkatesh
Proceedings of the 2005 International Conference on Software Engineeringá…, 2005
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I)
L Ertaul, W Lu
International Conference on Research in Networking, 102-113, 2005
Security of ad hoc networks and threshold cryptography
L Ertaul, N Chavan
2005 International Conference on Wireless Networks, Communications andá…, 2005
Elliptic curve cryptography based threshold cryptography (ecc-tc) implementation for manets
L Ertaul, N Chavan
IJCSNS 7 (4), 48, 2007
JHide-A tool kit for code obfuscation.
L Ertaul, S Venkatesh
IASTED Conf. on Software Engineering and Applications, 133-138, 2004
Implementation and performance analysis of pbkdf2, bcrypt, scrypt algorithms
L Ertaul, M Kaur, VAKR Gudise
Proceedings of the international conference on wireless networks (ICWN), 66, 2016
Security Planning Using Zachman Framework for Enterprisesy
L Ertaul, R Sudarsanam
USA: California State University, California State University, Hayward, 2005
Security of software defined networks (SDN)
L Ertaul, K Venkatachalam
Proceedings of the International Conference on Wireless Networks (ICWN), 24-30, 2017
Analysis of lightweight message authentication codes for IoT environments
G Saldamli, L Ertaul, A Shankaralingappa
2019 Fourth International Conference on Fog and Mobile Edge Computing (FMECá…, 2019
Wildfire detection using wireless mesh network
G Saldamli, S Deshpande, K Jawalekar, P Gholap, L Tawalbeh, L Ertaul
2019 Fourth international conference on fog and mobile edge computing (FMECá…, 2019
IoT security: Performance evaluation of grain, mickey, and trivium-lightweight stream ciphers
L Ertaul, A Woodall
Proceedings of the International Conference on Security and Management (SAMá…, 2017
Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs).
L Ertaul, V Kedlaya
ICWN, 186-192, 2007
Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs).
L Ertaul, D Ibrahim
Security and Management 363, 363, 2009
On the generation of x. 509v3 certificates with biometric information
G Martınez-Silva, F Rodrıguez-Henrıquez, N Cruz-CortÚs, L Ertaul
Security and Management, 52-57, 2007
The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations.
L Ertaul, S Mullapudi
ICWN, 3-9, 2009
Performance analysis of CLEFIA, PICCOLO, TWINE Lightweight block ciphers in IoT environment
L Ertaul, SK Rajegowda
Proceedings of the International Conference on Security and Management (SAMá…, 2017
Securing car data and analytics using blockchain
G Saldamli, K Karunakaran, VK Vijaykumar, W Pan, S Puttarevaiah, ...
2020 Seventh International Conference on Software Defined Systems (SDS), 153-159, 2020
Post-Quantum Cryptography on IoT: Merkle's Tree Authentication
G Saldamli, L Ertaul, B Kodirangaiah
Proceedings of the International Conference on Wireless Networks (ICWN), 35-41, 2018
Applying the kill chain and diamond models to Microsoft advanced threat analytics
L Ertaul, M Mousa
Proceedings of the International Conference on Security and Management (SAMá…, 2018
The system can't perform the operation now. Try again later.
Articles 1–20