Ersin Uzun
Cited by
Cited by
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
International conference on financial cryptography and data security, 399-414, 2012
DoS & DDoS in Named Data Networking
E Uzun, P Gasti, G Tsudik, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
Interest flooding attack and countermeasures in named data networking
A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang
2013 IFIP Networking Conference, 1-9, 2013
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
Loud and clear: Human-verifiable authentication based on audio
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
Needle in a haystack: Mitigating content poisoning in named-data networking
C Ghali, G Tsudik, E Uzun
Proceedings of NDSS Workshop on Security of Emerging Networking Technologies …, 2014
Flexible end-to-end content security in CCN
CA Wood, E Uzun
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 858-865, 2014
CCN-krs: A key resolution service for ccn
P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves
Proceedings of the 1st ACM Conference on Information-Centric Networking, 97-106, 2014
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
Network-layer trust in named-data networking
C Ghali, G Tsudik, E Uzun
ACM SIGCOMM Computer Communication Review 44 (5), 12-19, 2014
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
International Conference on Information Security, 385-400, 2008
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
arXiv preprint arXiv:1112.2205, 2011
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
BEDA: Button-enabled device association
C Soriente, G Tsudik, E Uzun
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
Serial hook-ups: a comparative usability study of secure device pairing methods
A Kobsa, R Sonawalla, G Tsudik, E Uzun, Y Wang
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
System and method for ranking named-data networking objects in a cache
E Uzun
US Patent App. 14/516,450, 2016
An encryption-based access control framework for content-centric networking
J Kuriharay, E Uzun, CA Wood
2015 IFIP networking conference (IFIP networking), 1-9, 2015
Method and system for verifying renamed content using manifests in a content centric network
I Solis, ME Mosko, E Uzun
US Patent 9,536,059, 2017
The system can't perform the operation now. Try again later.
Articles 1–20