Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
2020 International Conference on Information Security and Cryptology ISCTURKEY 2020 3-4 December 2020 Middle East Technical University Ankara, TURKEY
Date
2020-12-01
Author
Sağıroğlu, Şeref
Özbudak, Ferruh
Akleylek, Sedat
Canbay, Yavuz
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
275
views
0
downloads
Cite This
xiiPREFACEInternational Conference on Information Security and Cryptology Conference (ISCTurkey) has been held since 2006. The 13th conference was completed in Ankara, Turkey, between December 3-4, 2020 via online due to the COVID-19 pandemic.This conference aims to bring people from both academia and industry to share the latest advances in cyber security and cryptology, develop cooperation between university and industry, inform the public, and increase the public awareness of information security. This year, the main theme of the ISCTurkey 2020 Conference has been determined as "Cyber Security and Secure Data Sharing and Transfer." The increase in applications of Machine to Machine communication (M2M), the Internet of Things (IoT), Artificial Intelligence, Blockchain Technology, and Post-Quantum Cryptography drastically changes the nature of both cyber defense and cyber-attacks. New developments and changes in these fields within the framework of the definition of digital identity emerging are discussed at the conference. Besides, cyber-attacks and the measures to be taken against them are the conference's other topics.This year, the number of submissions to ISCTurkey 2020 was 29. 14 papers out of 29 were accepted after the reviewing process. The acceptance rate is 48.28%. The total number of reviewers was 87. At least three reviewers from the scientific committee members reviewed all papers submitted and the average number of reviewers for each article was three.We would like to thank all authors for submitting their works, reviewers for their time for reviewing and commenting on the submissions, and committee members for their time to make this conference successful. We also would like to thank all sponsors for financial and technical support.On Behalf of Organizing CommitteeProf. Dr. Ferruh ÖzbudakConference Chairman
URI
https://hdl.handle.net/11511/93409
Collections
Department of Mathematics, Book / Book chapter
Suggestions
OpenMETU
Core
MULTI-GROUP MULTICAST BEAMFORMING FOR SIMULTANEOUS WIRELESS INFORMATION AND POWER TRANSFER
Demir, Özlem Tuğfe; Tuncer, Temel Engin (2015-09-04)
In this paper, simultaneous wireless information and power transfer (SWIPT) concept is introduced for multi group multicast beamforming. Each user has a single antenna and a power splitter which divides the radio frequency (RF) signal into two for both information decoding and energy harvesting. The aim is to minimize the total transmission power at the base station while satisfying both signal-to-interference-plus- noise-ratio (SINR) and harvested power constraints at each user. Unlike unicast and certain ...
SIMULATION CONCEPTS FOR INFORMATION-SYSTEM
MOURANT, RR; Tarı, Zehra Sibel (Elsevier BV, 1993-09-01)
Recent Improvements in document image systems and their low-cost implementation on networks of microcomputers is leading to the reengineering of many information systems. We describe how document image systems can be applied to information systems. In order to compare the performance of a conventional information system with one implemented with document imaging processing capability we conducted a discrete event simulation. We modeled the conventional information system for processing graduate student ...
Comparison of Intelligent Classification Techniques by Practicing a Specific Technology Audit
Berkol, A.; Kara, G.; Turk, A. (2016-09-08)
Technology audit activities arc carried out for assessment of firms' technological requirements, capacity or management capability. The aim of these assessments is to define the weaknesses of firms and develop actions in order to improve firms' technological capacity and/or technology management capability. Generally these activities are implemented with survey questionnaires. These questionnaires can be filled by managers of firms or can be implemented as an interview by independent experts. However, evalu...
Hierarchical multitasking control of discrete event systems: Computation of projections and maximal permissiveness
Schmidt, Klaus Verner; Cury, José E.r. (null; 2010-12-01)
This paper extends previous results on the hierarchical and decentralized control of multitasking discrete event systems (MTDES). Colored observers, a generalization of the observer property, together with local control consistency, allow to derive sufficient conditions for synthesizing modular and hierarchical control that are both strongly nonblocking (SNB) and maximally permissive. A polynomial procedure to verify if a projection fulfills the above properties is proposed and in the case they fail for a g...
On some cryptographic properties of Rijndael
Kavut, S; Yucel, MD (2001-01-01)
We examine diffusion properties of Rijndael which has been selected by US National Institute of Standards and Technology (NIST) for the proposed Advanced Encryption Standard (AES). Since the s-box of Rijndael applies a nonlinear transformation operating on each byte of the intermediate cipher result independently, its characteristics have significant effects on the strength of the entire system. The characteristics of Rijndael's s-box are investigated for the criteria of avalanche, strict avalanche, bit ind...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
Ş. Sağıroğlu, F. Özbudak, S. Akleylek, and Y. Canbay,
2020 International Conference on Information Security and Cryptology ISCTURKEY 2020 3-4 December 2020 Middle East Technical University Ankara, TURKEY
. 2020.