Ersin Uzun
Title
Cited by
Cited by
Year
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
International conference on financial cryptography and data security, 399-414, 2012
6892012
DoS & DDoS in Named Data Networking
E Uzun, P Gasti, G Tsudik, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
483*2013
Interest flooding attack and countermeasures in Named Data Networking
A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang
2013 IFIP Networking Conference, 1-9, 2013
4132013
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
4042004
Loud and clear: Human-verifiable authentication based on audio
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
3122006
Needle in a haystack: Mitigating content poisoning in named-data networking
C Ghali, G Tsudik, E Uzun
Proceedings of NDSS Workshop on Security of Emerging Networking Technologies …, 2014
2482014
Flexible end-to-end content security in CCN
CA Wood, E Uzun
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 858-865, 2014
2232014
CCN-krs: A key resolution service for ccn
P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves
Proceedings of the 1st ACM Conference on Information-Centric Networking, 97-106, 2014
1812014
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
1762007
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
1602008
Network-layer trust in named-data networking
C Ghali, G Tsudik, E Uzun
ACM SIGCOMM Computer Communication Review 44 (5), 12-19, 2014
1592014
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
1352011
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
1192013
BEDA: Button-enabled device association
C Soriente, G Tsudik, E Uzun
1022007
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
932009
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
892009
Serial hook-ups: a comparative usability study of secure device pairing methods
A Kobsa, R Sonawalla, G Tsudik, E Uzun, Y Wang
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
892009
System and method for ranking named-data networking objects in a cache
E Uzun
US Patent App. 14/516,450, 2016
762016
The impact of transmission power control strategies on lifetime of wireless sensor networks
H Cotuk, K Bicakci, B Tavli, E Uzun
IEEE Transactions on Computers 63 (11), 2866-2879, 2013
652013
An encryption-based access control framework for content-centric networking
J Kuriharay, E Uzun, CA Wood
2015 IFIP networking conference (IFIP networking), 1-9, 2015
642015
The system can't perform the operation now. Try again later.
Articles 1–20