default search action
Ersin Uzun
Person information
- affiliation: University of California, Irvine, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j11]Cesar Ghali, Gene Tsudik, Ersin Uzun:
In Content We Trust: Network-Layer Trust in Content-Centric Networking. IEEE/ACM Trans. Netw. 27(5): 1787-1800 (2019) - 2017
- [j10]Edith C. H. Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, Christopher A. Wood:
Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy. Comput. Commun. Rev. 47(1): 49-54 (2017) - [c26]Vincent Bindschaedler, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun:
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks. CODASPY 2017: 115-125 - [c25]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Closing the Floodgate with Stateless Content-Centric Networking. ICCCN 2017: 1-10 - [c24]Marc Mosko, Ersin Uzun, Christopher A. Wood:
Mobile sessions in content-centric networks. Networking 2017: 1-9 - 2016
- [c23]Gene Tsudik, Ersin Uzun, Christopher A. Wood:
AC3N: Anonymous communication in Content-Centric Networking. CCNC 2016: 988-991 - [c22]Christian F. Tschudin, Ersin Uzun, Christopher A. Wood:
Trust in Information-Centric Networking: From Theory to Practice. ICCCN 2016: 1-9 - [i13]Edith C. H. Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun:
Information-centric Networking and Security (Dagstuhl Seminar 16251). Dagstuhl Reports 6(6): 49-61 (2016) - 2015
- [c21]Jun Kurihara, Ersin Uzun, Christopher A. Wood:
An encryption-based access control framework for content-centric networking. Networking 2015: 1-9 - [c20]Shantanu Rane, Julien Freudiger, Alejandro E. Brito, Ersin Uzun:
Privacy, efficiency & fault tolerance in aggregate computations on massive star networks. WIFS 2015: 1-6 - [i12]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking. CoRR abs/1512.07755 (2015) - 2014
- [j9]Cesar Ghali, Gene Tsudik, Ersin Uzun:
Network-Layer Trust in Named-Data Networking. Comput. Commun. Rev. 44(5): 12-19 (2014) - [c19]Priya Mahadevan, Ersin Uzun, Spencer Sevilla, J. J. Garcia-Luna-Aceves:
CCN-KRS: a key resolution service for CCN. ICN 2014: 97-106 - [c18]Julien Freudiger, Shantanu Rane, Alejandro E. Brito, Ersin Uzun:
Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. WISCS@CCS 2014: 21-29 - [c17]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. ESORICS (2) 2014: 128-145 - [c16]Shantanu Rane, Ersin Uzun:
A fuzzy commitment approach to privacy preserving behavioral targeting. SPME@MobiCom 2014: 31-36 - [e1]Ersin Uzun, Mohamed Ali Kâafar:
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014. ACM 2014, ISBN 978-1-4503-3075-6 [contents] - [i11]Cesar Ghali, Gene Tsudik, Ersin Uzun:
Elements of Trust in Named-Data Networking. CoRR abs/1402.3332 (2014) - [i10]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. CoRR abs/1405.1328 (2014) - [i9]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. IACR Cryptol. ePrint Arch. 2014: 502 (2014) - 2013
- [j8]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in content-oriented networking: threats and countermeasures. Comput. Commun. Rev. 43(3): 25-33 (2013) - [j7]Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Can Jannie verify? Usability of display-equipped RFID tags for security purposes. J. Comput. Secur. 21(3): 347-370 (2013) - [c15]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named Data Networking. ICCCN 2013: 1-7 - [c14]Alexander Afanasyev, Priya Mahadevan, Ilya Moiseenko, Ersin Uzun, Lixia Zhang:
Interest flooding attack and countermeasures in Named Data Networking. Networking 2013: 1-9 - 2012
- [j6]Van Jacobson, Rebecca Braynard, Tim Diebert, Priya Mahadevan, Marc Mosko, Nicholas H. Briggs, Simon Barber, Michael F. Plass, Ignacio Solis, Ersin Uzun, Byoung-Joon Lee, Myeong-Wuk Jang, Dojun Byun, Diana K. Smetters, James D. Thornton:
Custodian-based information sharing. IEEE Commun. Mag. 50(7): 38-43 (2012) - [c13]Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun:
Bitter to Better - How to Make Bitcoin a Better Currency. Financial Cryptography 2012: 399-414 - [c12]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. NDSS 2012 - [i8]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named-Data Networking. CoRR abs/1208.0952 (2012) - [i7]Chaabane Abdelberi, Emiliano De Cristofaro, Mohamed Ali Kâafar, Ersin Uzun:
Privacy in Content-Oriented Networking: Threats and Countermeasures. CoRR abs/1211.5183 (2012) - 2011
- [j5]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
User-aided reader revocation in PKI-based RFID systems. J. Comput. Secur. 19(6): 1147-1172 (2011) - [c11]Ersin Uzun, Nitesh Saxena, Arun Kumar:
Pairing devices for social interactions: a comparative usability evaluation. CHI 2011: 2315-2324 - [c10]Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Usability of Display-Equipped RFID Tags for Security Purposes. ESORICS 2011: 434-451 - [i6]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. CoRR abs/1112.2205 (2011) - 2010
- [c9]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. ESORICS 2010: 19-36 - [c8]Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Groupthink: usability of secure group association for wireless devices. UbiComp 2010: 331-340
2000 – 2009
- 2009
- [j4]Claudio Soriente, Gene Tsudik, Ersin Uzun:
Secure pairing of interface constrained devices. Int. J. Secur. Networks 4(1/2): 17-26 (2009) - [j3]Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun:
Using audio in secure device pairing. Int. J. Secur. Networks 4(1/2): 57-68 (2009) - [j2]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
A comparative study of secure device pairing methods. Pervasive Mob. Comput. 5(6): 734-749 (2009) - [c7]Mario Cagalj, Nitesh Saxena, Ersin Uzun:
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. CANS 2009: 443-462 - [c6]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. PerCom 2009: 1-10 - [c5]Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang:
Serial hook-ups: a comparative usability study of secure device pairing methods. SOUPS 2009 - [i5]Arun Kumar, Nitesh Saxena, Ersin Uzun:
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting. CoRR abs/0907.4743 (2009) - [i4]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. IACR Cryptol. ePrint Arch. 2009: 465 (2009) - 2008
- [j1]Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:
A Reputation-based Trust Management System for P2P Networks. Int. J. Netw. Secur. 6(2): 227-237 (2008) - [c4]Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400 - 2007
- [c3]Ersin Uzun, Kristiina Karvonen, N. Asokan:
Usability Analysis of Secure Pairing Methods. Financial Cryptography 2007: 307-324 - [i3]Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human Asisted Pure Audio Device Pairing. IACR Cryptol. ePrint Arch. 2007: 93 (2007) - [i2]Claudio Soriente, Gene Tsudik, Ersin Uzun:
BEDA: Button-Enabled Device Pairing. IACR Cryptol. ePrint Arch. 2007: 246 (2007) - 2006
- [c2]Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10 - 2005
- [i1]Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. IACR Cryptol. ePrint Arch. 2005: 428 (2005) - 2004
- [c1]Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente:
A reputation-based trust management system for P2P networks. CCGRID 2004: 251-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint