homepeople › ersin uzun



Ersin Uzun
Vice President, Computing Science Laboratory

Ersin Uzun is Vice President and Director of PARC's Computing Science Laboratory. His organization focuses on research and development of new security and communication technologies as well as offering professional innovation services such as rapid prototyping, user needs research and innovation management.

In his previous role at PARC, Ersin was the global director of technology solutions & strategy, leading PARC's efforts in developing innovative and cutting-edge solutions to the industries' most challenging problems. Prior to that, Ersin also directed PARC's research efforts in Data Security and Privacy, leading its visionary research in Privacy Preserving Analytics, Content-Centric Networking and Named-Data Networking.

Before joining PARC, Ersin held positions at Nokia Research Center, HP Labs and Ericsson. His professional experience also includes co-founding two technology startups and running a technology consulting practice. Ersin received his Ph.D. and M.S. degrees from UC Irvine, and is the author of over one hundred peer-reviewed publications and pending/issued patents.


PARC publications

view publications by:  date | title | type | focus area



Achieving Privacy, Efficiency and Fault Tolerance in Aggregate Computations on Massive Star Networks

IEEE Workshop on Information Forensics and Security 2015

16 September 2015


Privacy Preserving Data Quality Assessment

ACM Workshop on Information Sharing and Collaborative Security (WISCS)

3 November 2014

Network-Layer Trust in Named-Data Networking

ACM SIGCOMM Computer Communication Review Magazine

27 October 2014

CCN-KRS: A Key Resolution Service for CCN

ACM Information Centric Networking Conference

24 September 2014

A Fuzzy Commitment Approach to Privacy Preserving Behavioral Targeting

Workshop on Security and Privacy aspects of Mobile Environments (SPME 2014)

11 September 2014

Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking

NDSS Workshop on Security of Emerging Networking Technologies

23 February 2014

Flexible End-to-End Content Security in CCN

IEEE Consumer Communications & Networking Conference

11 January 2014


Privacy in content-oriented networking


13 August 2013

DoS & DDoS in Named Data Networking

International Conference on Computer Communications and Networks

31 July 2013

Interest flooding attack and countermeasures in Named Data Networking

Proceedings of the IFIP/IEEE Networking 2013 Conference

22 May 2013


PiCoDa: privacy-preserving smart coupon delivery architecture

5th Workshop on Hot Topics in Privacy-Preserving Technologies (HotPETS 2012)

13 July 2012

Custodian-based information sharing

IEEE Communications Magazine special issue on Information-Centric Networking

July 2012

Bitter to better - how to make Bitcoin a better currency

16th International Conference on Financial Cryptography and Data Security

27 February 2012

ANDaNA: Anonymous Named Data Networking Application

Annual Network & Distributed System Security Symposium (NDSS)

5 February 2012


User-aided reader revocation in PKI-based RFID systems

Journal of Computer Security

15 December 2011

Usability of display-equipped RFID tags for security purposes

European Symposium on Research in Computer Security (ESORICS)

13 September 2011

Enhancing cyber-physical security through data patterns

Workshop on Foundations of Dependable and Secure Cyber-Physical Systems

11 April 2011




other publications

view publications by:  date | title



SUDOKU: secure and usable deployment of keys on wireless sensors.

Sixth Workshop on Secure Network Protocols (NPSEC'10)

Groupthink: on the usability of secure group association of wireless devices

12th ACM International Conference on Ubiquitous Computing (Ubicomp'10)

Readers behaving badly: reader revocation in PKI-based RFID systems

15th European Symposium on Research in Computer Security (ESORICS'10)


On the usability of wireless device authentication based on distance bounding

The 8th International Conference on Cryptology And Network Security (CANS'09)

Secure pairing of interface constrained devices

International Journal on Security and Networks

Using audio in secure device pairing

International Journal on Security and Networks

A comparative study of secure device pairing methods

The Pervasive and Mobile Computing Journal (PMC)

Serial Hook-Ups: a comparative usability study of secure device pairing methods

The Fifth Symposium on Usable Privacy and Security (SOUPS’09).

Caveat Emptor: a comparative study of secure device pairing methods.

The 7th IEEE International Conference on Pervasive Computing and Communications (PerCom’09)


HAPADEP: human-assisted pure audio (secure) device pairing.

The 11th international conference on Information Security (ISC’08)

A reputation-based trust management system for P2P networks.

International Journal of Network Security


BEDA: button enabled device pairing.

International Workshop on Security for Spontaneous Interaction (IWSSI’07)

Usability analysis of secure pairing methods

Financial Cryptography and Data Security


Loud And Clear: Human-Verifiable Authentication Based on Audio

The 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06)


A reputation based trust management system for P2P networks

The 4th IEEE International Symposium on Cluster Computing and the Grid (CCGRID'04)