Umut Topkara, Ph.D. - Publications

Affiliations: 
2007 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

12 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Azimpourkivi M, Topkara U, Carbunar B. Camera Based Two Factor Authentication Through Mobile and Wearable Devices Arxiv: Cryptography and Security. 1: 35. DOI: 10.1145/3131904  0.367
2016 Rahman M, Topkara U, Carbunar B. Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors Ieee Transactions On Mobile Computing. 15: 1197-1210. DOI: 10.1109/Tmc.2015.2456904  0.305
2016 Rahman M, Carbunar B, Topkara U. Secure management of low power fitness trackers Ieee Transactions On Mobile Computing. 15: 447-459. DOI: 10.1109/Tmc.2015.2418774  0.343
2013 Castro PC, Ligman JW, Pistoia M, Ponzo J, Thomas GS, Topkara U. Runtime adaptive multi-factor authentication for mobile devices Journal of Reproduction and Development. 57: 2. DOI: 10.1147/Jrd.2013.2281123  0.339
2007 Topkara U, Atallah MJ, Topkara M. Passwords decay, words endure: Secure and re-usable multiple password mnemonics Proceedings of the Acm Symposium On Applied Computing. 292-299. DOI: 10.1145/1244002.1244072  0.528
2007 Topkara M, Topkara U, Atallah MJ. Information hiding through errors: A confusing approach Proceedings of Spie - the International Society For Optical Engineering. 6505.  0.409
2006 Topkara M, Topkara U, Atallah MJ. Words are not enough: Sentence level natural language watermarking Proceedings of the Acm International Multimedia Conference and Exhibition. 37-46. DOI: 10.1145/1178766.1178777  0.52
2006 Taskiran CM, Topkara U, Topkara M, Delp EJ. Attacks on lexical natural language steganography systems Proceedings of Spie - the International Society For Optical Engineering. 6072. DOI: 10.1117/12.649551  0.356
2006 Topkara U, Topkara M, Atallah MJ. The hiding virtues of ambiguity: Quantifiably resilient watermarking of natural language text through synonym substitutions Proceedings of the Multimedia and Security Workshop 2006, Mm and Sec'06. 2006: 164-174.  0.539
2005 Jeyaraman S, Topkara U. Have the cake and eat it too - Infusing usability into text-password based authentication systems Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 473-482. DOI: 10.1109/CSAC.2005.28  0.541
2004 Topkara M, Topkara U, Atallah MJ, Taskiran C, Lin E, Delp EJ. A hierarchical protocol for increasing the stealthiness of steganographic methods Proceedings of the Multimedia and Security Workshop 2004, Mm and Sec'04. 16-24.  0.485
2003 Atallah MJ, Raskin V, Hempelmann CF, Karahan M, Sion R, Topkara U, Triezenberg KE. Natural language watermarking and tamperproofing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2578: 196-212.  0.522
Show low-probability matches.