Ersin Uzun
TitleCited byYear
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
International Conference on Financial Cryptography and Data Security, 399-414, 2012
5182012
DoS & DDoS in Named Data Networking
E Uzun, P Gasti, G Tsudik, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
475*2013
Interest flooding attack and countermeasures in Named Data Networking
A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang
2013 IFIP Networking Conference, 1-9, 2013
4132013
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
3582004
Loud and clear: Human-verifiable authentication based on audio
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
2912006
Needle in a haystack: Mitigating content poisoning in named-data networking
C Ghali, G Tsudik, E Uzun
Proceedings of NDSS Workshop on Security of Emerging Networking Technologies …, 2014
2662014
Flexible end-to-end content security in CCN
CA Wood, E Uzun
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 858-865, 2014
2552014
CCN-krs: A key resolution service for ccn
P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves
Proceedings of the 1st ACM Conference on Information-Centric Networking, 97-106, 2014
2162014
Network-layer trust in named-data networking
C Ghali, G Tsudik, E Uzun
ACM SIGCOMM Computer Communication Review 44 (5), 12-19, 2014
1722014
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
1672007
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
1482008
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1222011
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
982013
BEDA: Button-enabled device association
C Soriente, G Tsudik, E Uzun
962007
System and method for ranking named-data networking objects in a cache
E Uzun
US Patent App. 14/516,450, 2016
952016
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
892009
Serial hook-ups: a comparative usability study of secure device pairing methods
A Kobsa, R Sonawalla, G Tsudik, E Uzun, Y Wang
Proceedings of the 5th Symposium on Usable Privacy and Security, 10, 2009
832009
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
822009
Computer-implemented system and method for protecting sensitive data via data re-encryption
V Rao, S Rane, E Uzun, AE Brito
US Patent 10,277,563, 2019
692019
An encryption-based access control framework for content-centric networking
J Kuriharay, E Uzun, CA Wood
2015 IFIP networking conference (IFIP networking), 1-9, 2015
562015
The system can't perform the operation now. Try again later.
Articles 1–20