548 Dew Point Ave, Carlsbad, CA 92008 • 760 931-1613
70 Battery Pl, New York, NY 10280 • 212 842-9666 • 646 414-2902
Beaverton, OR
San Diego, CA
Lawrence, KS
Leawood, KS
548 Dew Point Ave, Carlsbad, CA 92011 • 760 880-0927
Work
Company:
Cloudarena
Sep 2011
Address:
Istanbul, Turkey
Position:
Founder
Education
Degree:
Ph.D.
School / High School:
University of Kansas
Sep 1994 to Dec 1997
Specialities:
Non-Linear Dynamics and Chaos, Physics
Skills
Soa • It Strategy • Software Development • Start Ups • Enterprise Software • Mobile Applications • Web Services • Enterprise Architecture • Java • Saas • Business Strategy • Cloud Computing • Software Project Management • System Architecture • Agile Methodologies • Software Engineering • Open Source • Mobile Devices • Software As A Service • New Business Development • Banking • Linux • Java Enterprise Edition • Software Design • Business Development • Ruby on Rails • Scrum • Web Applications • Lean Startup • Angel Investing • Bss • Logistics • Telco
Alexander Gantman - Poway CA, US Tolga Yalcinkaya - San Diego CA, US Gregory Gordon Rose - San Diego CA, US Lu Xiao - San Diego CA, US
International Classification:
H04L 9/06 H04L 9/08 H04L 9/28
US Classification:
380259, 380278, 380 44
Abstract:
A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared secret key, one or more constraints on the first proxy key, and a key derivation function. At least the shared secret key and key derivation function are known to the host device an a client device (authentication device). The first proxy key is sent to a proxy device to use in authenticating communications with the client device. An authenticated message is generated by the proxy device using the first proxy key and sent to the client device. The client device locally generates a second proxy key using the key derivation function, one or more constraints, and the shared secret key for authenticating the proxy device. The proxy device is authenticated if the client device successfully accesses the authenticated message from the proxy device using the second proxy key.
CloudArena - Istanbul, Turkey since Sep 2011
Founder
Hisar Capital Sep 2009 - Mar 2012
Managing Director
Allesta May 2001 - Dec 2009
Founder, Senior Managing Partner
Union Bank Nov 2001 - Oct 2009
Senior Enterprise Architect
Qualcomm 2006 - 2007
Consultant
Education:
University of Kansas Sep 1994 - Dec 1997
Ph.D., Non-Linear Dynamics and Chaos, Physics
University of Kansas Sep 1994 - Jun 1996
M.S, Chaos Theory, Physics
California University of Pennsylvania 1992 - 1994
BS, Physics and Mathematics
Bosphorus University 1988 - 1991
Skills:
Soa It Strategy Software Development Start Ups Enterprise Software Mobile Applications Web Services Enterprise Architecture Java Saas Business Strategy Cloud Computing Software Project Management System Architecture Agile Methodologies Software Engineering Open Source Mobile Devices Software As A Service New Business Development Banking Linux Java Enterprise Edition Software Design Business Development Ruby on Rails Scrum Web Applications Lean Startup Angel Investing Bss Logistics Telco
Languages:
English
Youtube
Paul Dwyer - something got me started - cover
Turhan Ykseler Orkestras nn prova kaydnn videoya uyarlanms halidir...2...
Category:
Music
Uploaded:
26 Jan, 2010
Duration:
4m 23s
ODT THBT 6. Anadolu Mzii Gnleri "nan ve Mzik"
Orta Dou Teknik niversitesi Trk Halk Bilimi Topluluu 6. Anadolu Mzii G...
Category:
Music
Uploaded:
16 Oct, 2008
Duration:
4m 1s
Gndem Program 27 Nisan Blm 2(CHP Kurultay)
CHP'nin 32. Olaan Kurultay 26-27 Nisan gnlerinde toplanacak. Atatrk Sp...
Category:
News & Politics
Uploaded:
28 Apr, 2008
Duration:
9m 10s
Meltem zcan - Simply the best -cover
Turhan Ykseler Orkestras nn prova kaydnn videoya uyarlanms halidir...2...
Category:
Music
Uploaded:
26 Jan, 2010
Duration:
4m 17s
tasarruf
30" sosyal propaganda devi. [yaz-ynet-kurgu... can yaan :write-direct...