default search action
Hüseyin Demirci
Person information
Other persons with a similar name
- Huseyin Demircioglu (aka: Hüseyin Demircioglu) — disambiguation page
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Soumia Zohra El Mestari, Gabriele Lenzini, Hüseyin Demirci:
Preserving data privacy in machine learning systems. Comput. Secur. 137: 103605 (2024) - 2023
- [j9]Yüksel Yurtay, Nilüfer Yurtay, Hüseyin Demirci, Esin Ayse Zaimoglu, Alper Göksu:
Improvement and Implementation of Sustainable Key Performance Indicators in Supply Chain Management: The Case of a Furniture Firm. IEEE Access 11: 41913-41927 (2023) - [j8]Emanuel Cunha, Miguel Silva, Inês Chaves, Hüseyin Demirci, Davide Lagoa, Diogo Lima, Miguel Rocha, Isabel Rocha, Oscar Días:
The first multi-tissue genome-scale metabolic model of a woody plant highlights suberin biosynthesis pathways in Quercus suber. PLoS Comput. Biol. 19(9) (2023) - 2022
- [j7]Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
An Analysis of Cholesteric Spherical Reflector Identifiers for Object Authenticity Verification. Mach. Learn. Knowl. Extr. 4(1): 222-239 (2022) - [c13]Mónica P. Arenas, Muhammed Ali Bingöl, Hüseyin Demirci, Georgios Fotiadis, Gabriele Lenzini:
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption. AFRICACRYPT 2022: 425-447 - [c12]Hüseyin Demirci, Gabriele Lenzini:
Privacy-preserving Copy Number Variation Analysis with Homomorphic Encryption. HEALTHINF 2022: 821-831 - 2021
- [c11]Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini:
Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. ARES 2021: 2:1-2:11
2010 – 2019
- 2017
- [j6]Mete Akgün, Hüseyin Demirci:
VCF-Explorer: filtering and analysing whole genome VCF files. Bioinform. 33(21): 3468-3470 (2017) - 2016
- [j5]Mete Akgün, Ö. Faruk Gerdan, Zeliha Görmez, Hüseyin Demirci:
FMFilter: A fast model based variant filtering tool. J. Biomed. Informatics 60: 319-327 (2016) - 2015
- [j4]Bugra Ozer, Mahmut Samil Sagiroglu, Hüseyin Demirci:
GeneCOST: a novel scoring-based prioritization framework for identifying disease causing genes. Bioinform. 31(22): 3715-3717 (2015) - [j3]Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
AKF: A key alternating Feistel scheme for lightweight cipher designs. Inf. Process. Lett. 115(2): 359-367 (2015) - [j2]Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Mehmet Sabir Kiraz, Hüseyin Demirci, Albert Levi:
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions. Wirel. Commun. Mob. Comput. 15(18): 2150-2166 (2015) - [c10]Pinar Kavak, Hüseyin Demirci:
LargeDEL: A tool for identifying large deletions in the whole genome sequencing data. CIBCB 2015: 1-7 - 2013
- [j1]Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
Biclique cryptanalysis of LBlock and TWINE. Inf. Process. Lett. 113(12): 423-429 (2013) - [c9]Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
ITUbee: A Software Oriented Lightweight Block Cipher. LightSec 2013: 16-27 - 2012
- [c8]Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
Impossible Differential Cryptanalysis of Reduced-Round LBlock. WISTP 2012: 179-188 - 2011
- [c7]Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci:
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. RFIDSec 2011: 78-93 - [c6]Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci:
Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher. Selected Areas in Cryptography 2011: 169-184
2000 – 2009
- 2009
- [c5]Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal:
Improved Meet-in-the-Middle Attacks on AES. INDOCRYPT 2009: 144-156 - 2008
- [c4]Hüseyin Demirci, Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES. FSE 2008: 116-126 - [c3]Mete Akgün, Pinar Kavak, Hüseyin Demirci:
New Results on the Key Scheduling Algorithm of RC4. INDOCRYPT 2008: 40-52 - 2003
- [c2]Hüseyin Demirci, Ali Aydin Selçuk, Erkan Türe:
A New Meet-in-the-Middle Attack on the IDEA Block Cipher. Selected Areas in Cryptography 2003: 117-129 - 2002
- [c1]Hüseyin Demirci:
Square-like Attacks on Reduced Rounds of IDEA. Selected Areas in Cryptography 2002: 147-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint