Home > Research > Researchers > Dr Ibrahim Bagci > Publications

Dr Ibrahim Bagci

  1. Published

    A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to journalJournal articlepeer-review

  2. Published

    Atomic-scale authentication using imperfect semiconductor structures

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M. A., Missous, M., Roedig, U. & Young, R., 1/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  3. Published

    Atomic-scale authentication using resonant tunnelling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y. J., Young, M. P., Woodhead, C. S., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 23/02/2015, In: arxiv.org.

    Research output: Contribution to journalJournal article

  4. Published

    Atomic-scale authentication with resonant tunneling diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 2016, In: MRS Advances. 1, 22, p. 1625-1629 5 p.

    Research output: Contribution to journalJournal articlepeer-review

  5. Published

    Atomic-scale authentication with Resonant Tunnelling Diodes

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R., 27/07/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstract

  6. Published

    Codo: confidential data storage for wireless sensor networks

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 8/10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  7. Published

    Combined secure storage and communication for the Internet of Things

    Bagci, I. E., Raza, S., Chung, A., Roedig, U. & Voigt, T., 24/06/2013, 10th Annual IEEE Communications Society Conference on Sensing, Communication, and Networking (SECON 2013). Piscataway, N.J.: IEEE, p. 523-531 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Communication/computation tradeoffs for prolonging network lifetime in wireless sensor networks: The case of digital signatures

    Bicakci, K., Bagci, I. E. & Tavli, B., 1/04/2012, In: Information Sciences. 188, p. 44-63 20 p.

    Research output: Contribution to journalJournal articlepeer-review

  9. Published

    Data processing and communication strategies for lifetime optimization in wireless sensor networks

    Tavli, B., Kayaalp, M., Bagci, I. E. & Ceylan, O., 10/2010, In: AEÜ - International Journal of Electronics and Communications. 64, 10, p. 992-998 7 p.

    Research output: Contribution to journalJournal articlepeer-review

  10. Published

    Defend Your Home! Jamming Unsolicited Messages in the Smart Home

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 19/04/2013, HotWiSec '13 Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy. New York: ACM Press, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Demo Abstract: Home Jamming

    Brown, J., Bagci, I. E., King, A. & Roedig, U., 13/02/2013.

    Research output: Contribution to conference - Without ISBN/ISSN Otherpeer-review

  12. Published

    Extracting random numbers from quantum tunnelling through a single diode

    Bernardo Gavito, R., Bagci, I. E., Roberts, J., Sexton, J., Astbury, B., Shokeir, H., Mcgrath, T., Noori, Y., Woodhead, C., Missous, M., Roedig, U. & Young, R. J., 19/12/2017, In: Scientific Reports. 7, 6 p., 17879.

    Research output: Contribution to journalJournal articlepeer-review

  13. Published

    Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 10/2016, In: Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to journalJournal articlepeer-review

  14. Published

    Hotspot Generation for Unique Identification with Nanomaterials

    Abdelazim, N., Fong, J., McGrath, T., Woodhead, C., Al-Saymari, F., Bagci, I. E., Jones, A., Wang, X. & Young, R., 15/01/2021, In: Scientific Reports. 11, 7 p., 1528.

    Research output: Contribution to journalJournal articlepeer-review

  15. Published

    Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability

    Bicakci, K., Bagci, I. E. & Tavli, B., 02/2011, In: IEEE Communications Letters. 15, 2, p. 205-207 3 p.

    Research output: Contribution to journalJournal articlepeer-review

  16. Published

    Maximizing lifetime of event-unobservable wireless sensor networks

    Bicakci, K., Gultekin, H., Tavli, B. & Bagci, I. E., 06/2011, In: Computer Standards and Interfaces. 33, 4, p. 401-410 10 p.

    Research output: Contribution to journalJournal articlepeer-review

  17. Published

    Neighbor sensor networks: Increasing lifetime and eliminating partitioning through cooperation

    Bicakci, K., Bagci, I. E., Tavli, B. & Pala, Z., 06/2013, In: Computer Standards and Interfaces. 35, 4, p. 396-402 7 p.

    Research output: Contribution to journalJournal articlepeer-review

  18. Published

    Node identification using clock skew

    Bagci, I. E. & Roedig, U., 2013, Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013. Langendoen, K., Hu, W., Ferrari, F., Zimmerling, M. & Mottola, L. (eds.). Berlin: Springer Verlag, p. 111-123 13 p. (Lecture Notes in Electrical Engineering; vol. 281).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  19. Published

    Novel security mechanisms for wireless sensor networks

    Bagci, I. E., 29/01/2016, Lancaster University. 128 p.

    Research output: ThesisDoctoral Thesis

  20. Published

    Optically Interrogated Unique Object with Simulation Attack Prevention

    Marcinkevicius, P., Bagci, I. E., Abdelazim, N. M. S. I., Woodhead, C. S., Young, R. J. & Roedig, U., 25/03/2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, p. 198-203 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  21. Published

    Optimal data compression and forwarding in wireless sensor networks

    Tavli, B., Bagci, I. E. & Ceylan, O., 05/2010, In: IEEE Communications Letters. 14, 5, p. 408-410 3 p.

    Research output: Contribution to journalJournal articlepeer-review

  22. Published

    Quantum authentication

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 15/01/2015.

    Research output: Contribution to conference - Without ISBN/ISSN Abstractpeer-review

  23. Published

    Quantum Confinement in Security Elements

    McGrath, T., Bernardo Gavito, R., Bagci, I. E., Wang, C., Astbury, B., Young, R. J. & Roedig, U., 9/09/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  24. Published

    Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 30/04/2021, In: IEEE Transactions on Emerging Topics in Computing. 9, 2, p. 878-885 8 p.

    Research output: Contribution to journalJournal articlepeer-review

  25. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  26. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I., Yan, J. & Roedig, U., 20/05/2019. 2 p.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  27. Published

    Smart Speaker Privacy Control - Acoustic Tagging for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 23/05/2019, SafeThings 2019 : IEEE Workshop on the Internet of Safe Things. IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  28. Published

    SonarSnoop: active acoustic side-channel attacks

    Cheng, P., Bagci, I., Roedig, U. & Yan, J., 1/03/2020, In: International Journal of Information Security. 19, p. 213-228 16 p.

    Research output: Contribution to journalJournal articlepeer-review

  29. Published

    Strong PUFs from arrays of resonant tunnelling diodes

    Astbury, B., Bagci, I. E., McGrath, T., Sexton, J., Missous, M., Roedig, U., Bernardo Gavito, R. & Young, R. J., 10/05/2018, In: arXiv.

    Research output: Contribution to journalLetter

  30. Published

    SYSTEM AND METHOD FOR GENERATING ENTROPY VALUES

    Young, R. J., Bagci, I. E., McGrath, T., Roedig, U. & Bernardo Gavito, R., 1/01/2020, IPC No. G06F7/58, H04L9/08, Patent No. GB2575040A, 25/06/2018, Priority date 25/06/2018

    Research output: Patent

  31. Published

    Towards Reactive Acoustic Jamming for Personal Voice Assistants

    Cheng, P., Bagci, I. E., Yan, J. & Roedig, U., 15/10/2018, 2nd International Workshop on Multimedia Privacy and Security. ACM Press, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  32. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Using quantum confinement to uniquely identify devices

    Roberts, J., Bagci, I. E., Zawawi, M. A. M., Sexton, J., Hulbert, N., Noori, Y., Young, M., Woodhead, C., Missous, M., Migliorato, M. A., Roedig, U. & Young, R. J., 10/11/2015, In: Scientific Reports. 5, 8 p., 16456 .

    Research output: Contribution to journalJournal articlepeer-review

  34. Published

    Who are you? Proving your identity with physics

    Roberts, J., Bagci, I. E., Hulbert, N., Young, M., Woodhead, C., Noori, Y., Mogg, L., Migliorato, M., Missous, M., Roedig, U. & Young, R., 14/12/2014.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

Back to top