Levent Ertaul

Assoc Professor

Department of Mathematics & Computer Science

E-mail:
levent.ertaul@csueastbay.edu
Phone:
(510) 885-3463
Office:
SC-N 154
Vitae:
View my CV
Home Page:
http://www.mcs.csueastbay.edu/~lertaul/
Note: CSUEB does not pre-approve, monitor, or edit personal pages. Faculty members are solely responsible for their content, and are expected to conform to the policy guidelines of CSUEB.
Photo of Levent Ertaul

Research: Computer Networks Security, Cryptology,Wireless Security, Cloud Security

Professional Focus

Computer Networks Security, Cryptology, Wireless Security, Cloud Security

Education

  • PhD. University of Sussex, 1994
  • MSc. Hacettepe University, 1989
  • BSc EENG Anadolu University, 1984

Courses

Summer Quarter 2014
Course #SecCourse TitleDaysFromToLocationCampusTextbook Info
CS 452501SPPrinciples of Network SecurityTU8:00PM9:50PMSC-N104Hayward Campus View Books
CS 459402SPBroadband Networks and CommunTH8:00PM9:50PMSC-N104Hayward Campus View Books
CS 652501SPNetwork SecurityTU8:00PM9:50PMSC-N104Hayward Campus View Books
CS 659402SPBroadband & Multimedia NetwrksTH8:00PM9:50PMSC-N104Hayward Campus View Books

Publications

2012    L. Ertaul, Y. Martirosyan, “Implementation of a WEB Application for Evaluation of WEB Application Security Scanners”, Proceedings of the 2012 Internatioanl Conference on Security & Management SAM’12, July, Las Vegas.

 2012    L. Ertaul, V. Rathod, “ The Zachman Framework, the Owner’s Perpective & Security”, Proceedings of the 2012 Internatioanl Conference on Security & Management SAM’12, July, Las Vegas.

2011    L. Ertaul, S.Vandana, K. Gulati, G. Saldamli,“Enterprise Security Planning using the Zachman Framework – Builder’s Perspective, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2011    L. Ertaul, A. R. Pasham, H. Patel,  “Enterprise Security Planning using Zachman Framework: Designer’s Perspective, Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2011    L. Ertaul, A. Movasseghi, S. Kumar,  “Enterprise Security Planning with TOGAF-9, Proceedings of  Security and Management SAM’11, July, Las Vegas

 

2011    L. Ertaul, A. Movasseghi, S. Kumar,  “A Strategy for Information Security: TOGAF, Proceedings of  Security and Management SAM’11, July, Las Vegas.



 2011    L. Ertaul, J. Hao, “Enterprise Security Planning with Department of Defense Architecture Framework (DODAF), Proceedings of  Security and Management SAM’11, July, Las Vegas.

 2010    L.Ertaul, S. Singhal, G. Saldamli, “ Security Challenges in Cloud Computing ”, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10,  July, Las Vegas.

 2010    L.Ertaul, S. Natte, G. Saldamli,” Security Evaluation of CDMA2000”, WORLDCOMP2010, The 2010 International Conference on Wireless Networks ICWN'10, July, Las Vegas.

 2010    L. Ertaul, S. Chelivendri, G. Saldamli, “Security Issues for Mobile Government”, WORLDCOMP2010, The 2010 International Conference on Security and Management SAM'10,  July, Las Vegas.

 2010    B. Karaoglan, L. Ertaul, “A Practice in using E-Portfolio in a Higher Education Course Taught at Distance”, Journal of Electronics and Electrical Engineering, No:6(102), ISSN 1392 – 1215, June

 2010    B. Karaoglan, L. Ertaul, “A Practice in using E-Portfolio in a Higher Education Course Taught at Distance”, European Association for Education in Electrical and Information Engineering Council (EAEEIE) annual conference, 28-30 June,Palagna, Lithuania.

 2009    L. Ertaul, D. Ibrahim, “Evaluation of Secure Routing Protocols in Mobile Ad Hoc Networks (MANETs)”, The 2009 International Conference on Security and Management SAM'09,  July, Las Vegas.

 2009    L. Ertaul, S. Mullapudi, The Security Problems of Vehicular Ad Hoc Networks (VANETs) and Proposed Solutions in Securing their Operations”, The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas.

 2009    L. Ertaul, O. Catambay, Today and Tomorrow: IEEE 802.11 WLAN Security”, The 2009 International Conference on Security and Management SAM'09,  July, Las Vegas.

 2009    L. Ertaul, M. Ganta,Security in Wireless Sensor Networks - A Study”,The 2009 International Conference on Wireless Networks ICWN'09, July, Las Vegas.

 2008    L. Ertaul, J. H. Yang, Implementation of Domingo Ferrer’s a New Privacy Homomorphism (DF a New PH) in Securing Wireless Sensor Networks (WSN)”, The 2008  Applied Cryptology and Network Security (ACNS08), July, Las Vegas.

 

 2008    L. Ertaul, E. Celebi, M. Gozutok, “Implementation of Montgomery Multiplication Algorithms in Machine Languages, The 2008  Applied Cryptology and Network Security (ACNS08), July, Las Vegas.

 2008    J. H. Yang, L. Ertaul, Performance, Feasibility & Scalibility of Hommorphic Encryption Schemes in Securing Wireless Sensor Networks”, M.Sc Thesis, California State University, East Bay, May.

 

 2007    L. Ertaul, Vaidehi, ”Implementation of Homomorphic Encryption Schemes for Secure Packet Forwarding in Mobile Ad Hoc Networks (MANETs)”, IJCSNS International Journal of Computer Science and Network Security, VOL. 7  No. 11  pp. 132-141, November.

 2007    L. Ertaul, Vaidehi, “Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs)”, The 2007 International Conference on Wireless Networks, ICWN'07, June, Las Vegas

 2007    Vaidehi, L. Ertaul, ”Applications of Homomorphic Encryption Schemes to Provide Security in Computer Networks, Wireless Sensor Networks (WSN) and Wireless Mobile Ad Hoc Networks (MANETS) MSc. Thesis California State University, East Bay, October.

 2007    L. Ertaul, N. Chavan, ”RSA and Elliptic Curve- ElGamal Threshold Cryptography (ECCEG-TC) Implementations for Secure Data Forwarding in MANETs”, The 2007 International Conference on Security & Management, SAM'07, June, Las Vegas

 

 2007    E. Cuervo1, F. Henriquez, D. Arroyo, L. Ertaul, “A PDA Implementation of an Off-line e-Cash Protocol The 2007 International Conference on Applied Cryptography & Network Security, ACNS07, June, Las Vegas.

 2007    G. Silva1, F. Henriquez, N. Cortes , L. Ertaul, “On the Generation of X.509v3 Certificates with Biometric Information”, The 2007 International Conference on Security & Management, SAM'07, June, Las Vegas

 2007    J. Panda, L.Ertaul, “Mobile Agent Security”, M.Sc. Thesis, California State University, East Bay, June (Download implementation software)

 2007    L. Ertaul, N. Chavan, “Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC)  Implementation for MANETs”, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.4, page 48-61 April .

 2006    L.Ertaul, Vaidehi, “Finding Minimum Optimal Path Securely Using Homomorphic Encryption Schemes in Computer Networks”, The 2006 International Conference on Security & Management, SAM'06, June, Las Vegas

 2006    L. Ertaul, J. Panda, “Mobile Agent Security”, The 2006 International Conference on Security & Management, SAM'06, June, Las Vegas

 2006    L. Ertaul, B. Kasim, ”GSM Security IIThe 2006 International Conference on Wireless Networks, ICWN'06, June Las Vegas

 2005    L. Ertaul, R. Sudarsanam, Security Planning Using Zachman Framework for Enterprises”, Proceedings of EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK.

 2005    L. Ertaul, T. Braithwaite, B. L. Bellman, “Enterprise Security Planning (ESP)”, Proceedings of EURO mGOV 2005 (The First European Mobile Government Conference), July, University of Sussex, Brighton, UK.

 2005    L. Ertaul, S. Venkatesh, “Novel Obfuscation Algorithms for Software Security”, Proceedings of the 2005 International Conference on Software Engineering Research and Practice, SERP’05, June, Las Vegas

 2005    L. Ertaul, B. Kasim, “GSM Security”, Proceedings of the 2005 International Conference on Wireless Networks, ICWN’05, June, Las Vegas

 2005    L. Ertaul, N. Chavan, “Security of Ad Hoc Networks and Threshold Cryptography”, 2005 International Conference on Wireless Networks, Communications, and Mobile Computing, Wirelesscom 2005, MobiWac 2005, June 2005, Maui, Hawaii

 2005    L. Ertaul, W. Lu, “ECC based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in Mobile Ad Hoc Networks (MANET) I”, Proc. of Networking 2005 International Conference, May 2005, University of Waterloo, Ontario, CA

 2005    L. Ertaul, A. Akyol, “E-Commerce and Security”, Journal of Institute of Social Sciences, ONERI, Jan, 2005.

 2004    S. Venkatesh, L. Ertaul, “JHIDE – A Tool Kit for Code Obfuscation”, M.Sc. Thesis, California State University, East Bay, December

 2004    L. Ertaul, S. Venkatesh, “JHide-A Tool Kit for Code Obfuscation”, Proc. of IASTED International Confrerence on Software Engineering and Applications (SEA 2004), Nov. 2004, MIT Cambridge, USA. Download JHide tool kit http://www.mcs.csueastbay.edu/%7elertaul/JHide/

 2001   L. Ertaul, M. Afyonluoglu, “Personal Computer Security” BAS 2001, Proc. of the 6th Symposium on Computer Networks, Cyprus.

 2000   L. Ertaul , B. Yilmaz “Software Implementation of the SkipJack Algorithm” ISCIS XV, Proceedings of the 15th International Sciences, October , Istanbul

 2000    L. Ertaul, L. Ozalp “Survey and Evaluation of Security Products” Internal Report, Hacettepe University, September, 2000

 2000    L. Ertaul, A. Tekin “Security of Mobile Agents” ISCIS XV, Proceedings of the 15th International Sciences, October, Istanbul

 2000    L. Ertaul, A.Z. Alkar, H.S. Gecim, R. Sonmez, “ A VLSI Implemantation of DES and Triple DES with Pipelining Technique” MUG Conference, Portland, Oregon, USA , October.

 2000    L. Ertaul, B. Kasım “ Evaluation of GSM Security” BAS’2000, Proc. of the 5th Symposium on Computer Networks, Ankara.

 2000    A. Botan , L. Ertaul “An Investigation of ATM Forum Security Spesifications and a Multi-Layer ATM Security Model for TCP/IP over ATM (MLASM-t)” PhD Thesis, Hacettepe University, September

 1999    L. Ertaul, B. Kasım, M. Gözütok, İ.C. Baykal, T. Köprülü “Software Optimization Methods for the Implementation of RC2, RC4 and RC5 Security Algorithms”  Proc. of the Fourth Symposium on Computer Networks, İstanbul, May.

 1999     L. Ertaul, S. Gökçebag, T. Koprulu, M. Gozutok, "Authentication of a Unix User on Windows NT Server ", ISCIS XIV, Proceedings of The Fourteenth International Sciences, October, Kusadasi.

 1999     L. Ertaul, S. Ceylan, " Speed Optimized Software Implementation of Blowfish in ANSI C ", ISCIS XIV, Proceedings of The Fourteenth International Sciences, October , Kusadasi.

 1998    L. Ertaul, A. Işıklı, “The Evalution of Firewall Authentication Protocols”, BAS98, Proc. of the Third Symposium on Computer Networks, İzmir, June

 1998   L. Ertaul, M. Gözütok, C. Baykal, T. Köprülü, “An RSA Implementation in Software”, BAS98, Proc. of the Third Symposium on Computer Networks, İzmir June.

 1998    L. Ertaul, C. Baykal, M. Gözütok, T. Köprülü, "Speed Optimized Implementation of IDEA in ANSI C", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June.

 1998     L. Ertaul, T. Köprülü, S. Kondakci, H. Çaglar, Ö. Ergül, C. Baykal, M. Gözütok , A. Genç, S.Güven, K. Ince, "INTERCEPTOR: Design of a Firewall", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June. (in Turkish)

 1998     L. Ertaul, T. Göksu, "Yer Degistirmeli, Aktarmali ve Dizi sifreleyiciler için Türkçenin Yapisal Özelliklerini Kullanan bir Kriptoanaliz", BAS'98, Proc. of the Third Symposium on Computer Networks, Izmir, June. (in Turkish)

 1996    L. Ertaul, ‘Security Access Control Scheme (SACS) for Computer Networks’, BAS96, Proc. of the First Symposium on Computer Networks, Istanbul, May.

 1996    L. Ertaul, ‘A Solution to the Re-Blocking Problem in the Implementation of Improved Internet Security Access Control Scheme (IISACS)’, BAS96, Proc. of the First Symposium on Computer Networks, Istanbul, May.

 1996    L. Ertaul, ‘A Software Implementation of an Internet Security Access Control Scheme (ISACS) Through TCP/IP Protocols’, Ph.D. Thesis, University of Sussex, England.

 1994   L. Ertaul, M.J. English, F.S.F. Poon, ‘Distribution and Management of Secret Sequence Numbers for Large Computer Networks in an Internet Security Access Control Scheme’, Proc. of the 9th Int. Symp. on Computer and Information Sciences, November, Antalya.

 1993   L. Ertaul, M.J. English, F.S.F. Poon, ‘Improved  Session Initiation Authentication Protocols in Internet Access Control Scheme’, Proc. of the 2nd Int. Conf. on Computer Communications and Networks, San Diego, California, USA, June.

 1993    L.Ertaul, M.J. English, F.S.F. Poon, ‘Performance of Improved Session Initiation Authentication (SIA) Protocols’, Proc. of 5th Bangor Symp. on Communications, Bangor, England, June.

 1992    L. Ertaul, M.J. English, F.S.F. Poon, ‘Improvements to Internet Access Control Security Scheme’, I.E.E. Electronics Letters, Vol:28, No:13, page 1250-1251, June.

 1992    L. Ertaul, M.J. English, F.S.F. Poon, ‘A TCP/IP Implementation of an Internet Security Access Control Scheme’, Proc. of 4th Bangor Symp. on Communications, Bangor, England, May.

 1987   L. Ertaul, ‘Spread Spectrum Haberleşme Sistemi Modellemesi’, Hacettepe University Press.

 1987   L. Ertaul, ‘Modelling of Spread Spectrum Communications Sysytem (DS-QPSK)’, TMMOB Elektrik Mühendisliği, Vol: 32.

 1986    L. Ertaul, T. Cifcibasi, “Microprocessors and their Industrial Applications” Lecture Notes,  SEGEM Ankara & Ereğli, 103 pages, 1986

Presentations

GIVEN SEMINARS

 A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CDSIA2011, 4th Symposium in Curriculum Development in Security and Information Assurance (CDSIA) , San Jose State University, San Jose, CA, 2011

 A Practice in using E_Portfolio, WIKI, Discussion Board and TURNITIN in a Higher Education Course Taught at Distance, CSU East Bay,  3 Nov, Hayward, CA, 2011

 Security Services in Wireless AdHoc Networks (Conference Key Note Speech), VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico, 7-9 June, Toluca, Mexico, 2006

 Security of Mobile Ad-Hoc Networks (MANETs) and Threshold Cryptography, VII Coloquio Nacional De Codigos, Criptografia y Areas Relacionadas, La Universidad Autonoma del Estado de Mexico , 7-9 June, Toluca Mexico, 2006

 Today & Tommorow: IEEE 802.11 WLAN Security, CSU East Bay, Hayward, CA, 2006

 Today & Tomorrow: IEEE 802.11 WLAN Security, EURO mGOV 2005, Brighton, UK, 2005

 Security of Mobile Agents, CSU East Bay,Hayward, CA, 2002

 Security of Mobile Agents (Chameleon Agents), Oregon State University, OR, 2002

 Security in Computer Networks and Cryptology, Headquarters of Turkish Police Forces, 2002

 WEB Security (SSL, Firewalls), Oregon State University, OR, 2001

 Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

 Security in Computer Networks and Cryptology, Turkish General Staff (TGS), 2000

 Military Message Handling System (MMHS), NATO MMHSWG, 2000

 Turkish Military Message Handling System (MMHS)(MEDAS), NATO JWID 2000

 Turkish Military Message Handling System (MMHS)(MEDAS), Unified Efforts NATO 2000

 Security in Computer Networks, Turkish Telecom, 2000

 Security in Computer Networks, E-Commerce Board of Turkey, 2000

 Computer Networks, Turkish Telecom, 2000

 ATM Networks, Turkish Telecom, 2000

 ATM Networks, Turkish Telecom, 2000

 Security in Computer Networks, Turkish Telecom, 1999

 Security in Computer Networks, Turkish Telecom, 1999

 Computer Networks, Turkish Telecom, 1999

 Security in Computer Networks and Cryptology, Havelsan Co, 1997

 Security in Computer Networks and Cryptology, Havelsan Co, 1996

 Security in Computer Networks,  Haccettepe University, 1994

 An Internet Security Access Control Scheme (ISACS), Middle East Technical University, 1994

 An Internet Security Access Control Scheme (ISACS), Hacettepe University,  1994

 Intel 8085 Microprocessor Programming,  Iron and Steel Ind., 1987-1988

Service

Advising: CS, Net Option

Web Sites

  • Print This Page
  • Bookmark and Share