Home > Research > Researchers > Dr Ibrahim Bagci > Publications

Dr Ibrahim Bagci

Formerly at Lancaster University

  1. 2010
  2. Published

    Optimal data compression and forwarding in wireless sensor networks

    Tavli, B., Bagci, I. E. & Ceylan, O., 05/2010, In: IEEE Communications Letters. 14, 5, p. 408-410 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. 2011
  5. Published

    Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability

    Bicakci, K., Bagci, I. E. & Tavli, B., 02/2011, In: IEEE Communications Letters. 15, 2, p. 205-207 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Maximizing lifetime of event-unobservable wireless sensor networks

    Bicakci, K., Gultekin, H., Tavli, B. & Bagci, I. E., 06/2011, In: Computer Standards and Interfaces. 33, 4, p. 401-410 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. 2012
  8. Published

    Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures

    Bicakci, K., Bagci, I. E. & Tavli, B., 1/04/2012, In: Information Sciences. 188, p. 44-63 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Codo: confidential data storage for wireless sensor networks

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 8/10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  10. 2013
  11. Published

    Node identification using clock skew

    Bagci, I. E. & Roedig, U., 2013, Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013. Langendoen, K., Hu, W., Ferrari, F., Zimmerling, M. & Mottola, L. (eds.). Berlin: Springer Verlag, p. 111-123 13 p. (Lecture Notes in Electrical Engineering; vol. 281).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    Demo Abstract: Home Jamming

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 13/02/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  13. Published

    Defend Your Home! Jamming Unsolicited Messages in the Smart Home

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 19/04/2013, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM Press, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation

    Bicakci, K., Bagci, I. E., Tavli, B. & Pala, Z., 06/2013, In: Computer Standards and Interfaces. 35, 4, p. 396-402 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Combined secure storage and communication for the Internet of Things

    Bagci, I. E., Raza, S., Chung, A., Roedig, U. & Voigt, T., 24/06/2013, 10th Annual IEEE Communications Society Conference on Sensing, Communication, and Networking (SECON 2013). Piscataway, N.J.: IEEE, p. 523-531 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. 2014
  17. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  19. 2015
  20. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  21. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to Journal/MagazineJournal article

  22. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  23. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  24. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  25. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. 2016
  27. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Novel security mechanisms for wireless sensor networks

    Bagci, I. E., 29/01/2016, Lancaster University. 128 p.

    Research output: ThesisDoctoral Thesis

  29. Published

    Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 10/2016, In: Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  30. 2017
  31. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In: Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. 2018
  33. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In: arXiv.

    Research output: Contribution to Journal/MagazineLetter

  34. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

Previous 1 2 Next

Back to top