The full list of publications are in
(with M. Alown and M. A. Bingol) "Enhancing Democratic Processes: A Survey of DRE, Internet, and Blockchain in Electronic Voting Systems", in IEEE Access, doi: 10.1109/ACCESS.2025.3531349, Jan 2025.
(with Fahim Nasir and Abdulghani Ali Ahmed and Iryna Yevseyeva and Mubarak Saif) Data-Driven Decision-Making for Bank Target Marketing Using Supervised Learning Classifiers on Imbalanced Big Data. Computers, Materials & Continua 2024, 81(1), 1703-1728. https://doi.org/10.32604/cmc.2024.055192. Oct 2024.
(with Adarbah, H.Y. and Kardas, S. and Al-Bayatti and A.H. and Al-Bayatti H.M.Y. A) New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs. Future Internet 2024, 16, 328. https://doi.org/10.3390/fi16090328. Aug 2024.
(with Mustafa Ibrahim Alnajjar and Ali Al-Bayatti and Suleyman Kardas) Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption. Volume 2024, article number 62. https://doi.org/10.1186/s13638-024-02390-4. Aug 2024.
(with E. Larraia and O. Vaughan) "How to Redact the Bitcoin Backbone Protocol," 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Dublin, Ireland, 2024, pp. 485-493, doi: 10.1109/ICBC59979.2024.10634365. May 2024.
(with Mishri SalehAlMarshoud and Ali H.Al-Bayatti) Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions. ACM Comput. Surv. 56, 10, Article 260, 39 pages. https://doi.org/10.1145/3656166. Oct 2024.
(with Larraia, E. and Vaughan, O) NFT Trades in Bitcoin with Off-Chain Receipts. In: Zhou, J., et al. Applied Cryptography and Network Security Workshops. ACNS 2023. Lecture Notes in Computer Science, vol 13907. Springer, Cham. https://doi.org/10.1007/978-3-031-41181-6_6. Oct 2023.
(with Mishri SalehAlMarshoud and Ali H.Al-Bayatti) Location privacy in VANETs: Provably secure anonymous key exchange protocol based on self-blindable signatures, Vehicular Communications, Volume 36, 2022, ISSN 2214-2096, https://doi.org/10.1016/j.vehcom.2022.100490.
(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures, The Computer Journal, Volume 64, Issue 4, April 2021, Pages 564–574, https://doi.org/10.1093/comjnl/bxaa081.
(with Biçer, Osman, and Bingöl, Muhammed Ali) Highly Efficient and Reusable Private Function Evaluation with Linear Complexity, IEEE Transactions on Dependable and Secure Computing PP(99):1-1, DOI:10.1109/TDSC.2020.3009496, 2020.
(with Kubilay, Murat Yasin, and Mantar, Hacı Ali) CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain, Computers & Security, Volume 85, August 2019, Pages 333-352, https://doi.org/10.1016/j.cose.2019.05.013.
(with Biçer, Osman, and Bingöl, Muhammed Ali, and Levi, Albert) Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates, The Computer Journal, Volume 62, Issue 4, April 2019, Pages 598–613, https://doi.org/10.1093/comjnl/bxy136.
(with Uzunkol, Osmanbey) Still Wrong Use of Pairings in Cryptography. Applied Mathematics and Computation, Volume 333, 15 September 2018, Pages 467-479.
(with Kardaş, Süleyman) Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing, http://eprint.iacr.org/2016/696.pdf, 2017.
(with Kardaş, Süleyman and Bingöl, Muhammed Ali and Birinci, Fatih) Norwegian Internet Voting Protocol Revisited: Ballot Box and Receipt Generator are Allowed to Collude, International Journal “Security and Communication Networks, October 2016, https://doi.org/10.1002/sec.1678.
A Comprehensive Meta-Analysis of Cryptographic Security Mechanisms for Cloud Computing. Journal of Ambient Intelligence and Humanized Computing, https://doi.org/10.1007/s12652-016-0385-0, 2016.