Ersin Uzun

Affiliations:
  • University of California, Irvine, USA


According to our database1, Ersin Uzun authored at least 42 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
In Content We Trust: Network-Layer Trust in Content-Centric Networking.
IEEE/ACM Trans. Netw., 2019

2017
Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Comput. Commun. Rev., 2017

Mobile sessions in content-centric networks.
Proceedings of the 2017 IFIP Networking Conference, 2017

Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Information-centric Networking and Security (Dagstuhl Seminar 16251).
Dagstuhl Reports, 2016

Trust in Information-Centric Networking: From Theory to Practice.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

AC3N: Anonymous communication in Content-Centric Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015

Privacy, efficiency & fault tolerance in aggregate computations on massive star networks.
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015

An encryption-based access control framework for content-centric networking.
Proceedings of the 14th IFIP Networking Conference, 2015

2014
What's the Gist? Privacy-Preserving Aggregation of User Profiles.
IACR Cryptol. ePrint Arch., 2014

Elements of Trust in Named-Data Networking.
CoRR, 2014

Network-Layer Trust in Named-Data Networking.
Comput. Commun. Rev., 2014

A fuzzy commitment approach to privacy preserving behavioral targeting.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014

Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

CCN-KRS: a key resolution service for CCN.
Proceedings of the 1st International Conference on Information-Centric Networking, 2014

2013
Can Jannie verify? Usability of display-equipped RFID tags for security purposes.
J. Comput. Secur., 2013

Privacy in content-oriented networking: threats and countermeasures.
Comput. Commun. Rev., 2013

Interest flooding attack and countermeasures in Named Data Networking.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

DoS and DDoS in Named Data Networking.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Custodian-based information sharing.
IEEE Commun. Mag., 2012

ANDaNA: Anonymous Named Data Networking Application.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Bitter to Better - How to Make Bitcoin a Better Currency.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
User-aided reader revocation in PKI-based RFID systems.
J. Comput. Secur., 2011

Usability of Display-Equipped RFID Tags for Security Purposes.
Proceedings of the Computer Security - ESORICS 2011, 2011

Pairing devices for social interactions: a comparative usability evaluation.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
A comparative study of secure device pairing methods.
Pervasive Mob. Comput., 2009

Secure pairing of interface constrained devices.
Int. J. Secur. Networks, 2009

Using audio in secure device pairing.
Int. J. Secur. Networks, 2009

Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
IACR Cryptol. ePrint Arch., 2009

Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
CoRR, 2009

Serial hook-ups: a comparative usability study of secure device pairing methods.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Caveat Emptor: A Comparative Study of Secure Device Pairing Methods.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

On the Usability of Secure Association of Wireless Devices Based on Distance Bounding.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
A Reputation-based Trust Management System for P2P Networks.
Int. J. Netw. Secur., 2008

HAPADEP: Human-Assisted Pure Audio Device Pairing.
Proceedings of the Information Security, 11th International Conference, 2008

2007
BEDA: Button-Enabled Device Pairing.
IACR Cryptol. ePrint Arch., 2007

HAPADEP: Human Asisted Pure Audio Device Pairing.
IACR Cryptol. ePrint Arch., 2007

Usability Analysis of Secure Pairing Methods.
Proceedings of the Financial Cryptography and Data Security, 2007

2005
Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptol. ePrint Arch., 2005


  Loading...