Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and Private Distributed Source Coding With Private Keys and Decoder Side Information., , , and . IEEE Trans. Inf. Forensics Secur., (2023)Multiple Noisy Private Remote Source Observations for Secure Function Computation., , and . IACR Cryptol. ePrint Arch., (2022)Federated Learning with Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication., , and . ICASSP, page 2650-2654. IEEE, (2021)Low-Complexity and Reliable Transforms for Physical Unclonable Functions., and . ICASSP, page 2807-2811. IEEE, (2020)Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication., , and . ISIT, page 874-878. IEEE, (2020)Nested Tailbiting Convolutional Codes for Secrecy, Privacy, and Storage., , , and . IH&MMSec, page 79-89. ACM, (2020)Transmitter Actions for Secure Integrated Sensing and Communication., , and . IACR Cryptol. ePrint Arch., (2024)Correction: Günlü, O. Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints. Entropy 2022, 24, 110.. Entropy, 24 (7): 861 (2022)Key Agreement with Correlated Noise and Multiple Entities or Enrollments.. IACR Cryptol. ePrint Arch., (2021)An Optimality Summary: Secret Key Agreement with Physical Unclonable Functions., and . Entropy, 23 (1): 16 (2021)