Follow
Ersin Uzun
Title
Cited by
Cited by
Year
Bitter to better—how to make bitcoin a better currency
S Barber, X Boyen, E Shi, E Uzun
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
10162012
DoS & DDoS in Named Data Networking
E Uzun, P Gasti, G Tsudik, L Zhang
Computer Communications and Networks (ICCCN), 2013 22nd International …, 2013
636*2013
Interest flooding attack and countermeasures in named data networking
A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang
2013 IFIP Networking Conference, 1-9, 2013
5312013
A reputation-based trust management system for P2P networks
AA Selcuk, E Uzun, MR Pariente
IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid …, 2004
4542004
Loud and clear: Human-verifiable authentication based on audio
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
3462006
Needle in a haystack: Mitigating content poisoning in named-data networking
C Ghali, G Tsudik, E Uzun
Proceedings of NDSS workshop on security of emerging networking technologies …, 2014
2962014
Flexible end-to-end content security in CCN
CA Wood, E Uzun
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 858-865, 2014
2562014
Network-layer trust in named-data networking
C Ghali, G Tsudik, E Uzun
ACM SIGCOMM Computer Communication Review 44 (5), 12-19, 2014
2022014
Usability analysis of secure pairing methods
E Uzun, K Karvonen, N Asokan
International Conference on Financial Cryptography and Data Security, 307-324, 2007
1962007
CCN-krs: A key resolution service for ccn
P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves
Proceedings of the 1st ACM Conference on Information-Centric Networking, 97-106, 2014
1902014
HAPADEP: human-assisted pure audio device pairing
C Soriente, G Tsudik, E Uzun
Information Security: 11th International Conference, ISC 2008, Taipei …, 2008
1802008
ANDaNA: Anonymous named data networking application
S DiBenedetto, P Gasti, G Tsudik, E Uzun
NDSS, 2012
1682012
Privacy in content-oriented networking: Threats and countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
ACM SIGCOMM Computer Communication Review 43 (3), 25-33, 2013
1552013
A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
Pervasive and Mobile Computing 5 (6), 734-749, 2009
1182009
BEDA: Button-enabled device pairing
C Soriente, G Tsudik, E Uzun
Cryptology ePrint Archive, 2007
1162007
Serial hook-ups: a comparative usability study of secure device pairing methods
A Kobsa, R Sonawalla, G Tsudik, E Uzun, Y Wang
Proceedings of the 5th Symposium on Usable Privacy and Security, 1-12, 2009
1052009
Caveat eptor: A comparative study of secure device pairing methods
A Kumar, N Saxena, G Tsudik, E Uzun
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
1022009
An encryption-based access control framework for content-centric networking
J Kuriharay, E Uzun, CA Wood
2015 IFIP networking conference (IFIP networking), 1-9, 2015
912015
Method and system for verifying renamed content using manifests in a content centric network
I Solis, ME Mosko, E Uzun
US Patent 9,536,059, 2017
792017
System and method for ranking named-data networking objects in a cache
E Uzun
US Patent App. 14/516,450, 2016
792016
The system can't perform the operation now. Try again later.
Articles 1–20