homepeople › ersin uzun



Ersin Uzun

Ersin Uzun is the global director of technology solutions & strategy, leading PARC's efforts in developing innovative solutions to the industries' most challenging problems. 

Ersin has extensive research, technical management and consulting experience. In addition to his current role of overseeing the development of various software solutions for PARC's commercial clients, Ersin is an active researcher and the manager of security & privacy research area at PARCBefore joining PARC, Ersin worked at other leading research institutes such as Nokia Research Center, HP Labs and INRIA. His professional experience also includes co-founding two technology startups and working as an independent security R&D consultant for over 6 years.

Ersin received his Ph.D. and M.S. degrees in computer science from University of California, Irvine, and his B.S. degree in computer engineering from Bilkent University.


PARC publications

view publications by:  date | title | type | focus area



Achieving Privacy, Efficiency and Fault Tolerance in Aggregate Computations on Massive Star Networks

IEEE Workshop on Information Forensics and Security 2015

16 September 2015


Privacy Preserving Data Quality Assessment

ACM Workshop on Information Sharing and Collaborative Security (WISCS)

3 November 2014

Network-Layer Trust in Named-Data Networking

ACM SIGCOMM Computer Communication Review Magazine

27 October 2014

CCN-KRS: A Key Resolution Service for CCN

ACM Information Centric Networking Conference

24 September 2014

A Fuzzy Commitment Approach to Privacy Preserving Behavioral Targeting

Workshop on Security and Privacy aspects of Mobile Environments (SPME 2014)

11 September 2014

Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking

NDSS Workshop on Security of Emerging Networking Technologies

23 February 2014

Flexible End-to-End Content Security in CCN

IEEE Consumer Communications & Networking Conference

11 January 2014


Privacy in content-oriented networking


13 August 2013

DoS & DDoS in Named Data Networking

International Conference on Computer Communications and Networks

31 July 2013

Interest flooding attack and countermeasures in Named Data Networking

Proceedings of the IFIP/IEEE Networking 2013 Conference

22 May 2013


PiCoDa: privacy-preserving smart coupon delivery architecture

5th Workshop on Hot Topics in Privacy-Preserving Technologies (HotPETS 2012)

13 July 2012

Custodian-based information sharing

IEEE Communications Magazine special issue on Information-Centric Networking

July 2012

Bitter to better - how to make Bitcoin a better currency

16th International Conference on Financial Cryptography and Data Security

27 February 2012

ANDaNA: Anonymous Named Data Networking Application

Annual Network & Distributed System Security Symposium (NDSS)

5 February 2012


User-aided reader revocation in PKI-based RFID systems

Journal of Computer Security

15 December 2011

Usability of display-equipped RFID tags for security purposes

European Symposium on Research in Computer Security (ESORICS)

13 September 2011

Enhancing cyber-physical security through data patterns

Workshop on Foundations of Dependable and Secure Cyber-Physical Systems

11 April 2011




other publications

view publications by:  date | title



SUDOKU: secure and usable deployment of keys on wireless sensors.

Sixth Workshop on Secure Network Protocols (NPSEC'10)

Groupthink: on the usability of secure group association of wireless devices

12th ACM International Conference on Ubiquitous Computing (Ubicomp'10)

Readers behaving badly: reader revocation in PKI-based RFID systems

15th European Symposium on Research in Computer Security (ESORICS'10)


On the usability of wireless device authentication based on distance bounding

The 8th International Conference on Cryptology And Network Security (CANS'09)

Secure pairing of interface constrained devices

International Journal on Security and Networks

Using audio in secure device pairing

International Journal on Security and Networks

A comparative study of secure device pairing methods

The Pervasive and Mobile Computing Journal (PMC)

Serial Hook-Ups: a comparative usability study of secure device pairing methods

The Fifth Symposium on Usable Privacy and Security (SOUPS’09).

Caveat Emptor: a comparative study of secure device pairing methods.

The 7th IEEE International Conference on Pervasive Computing and Communications (PerCom’09)


HAPADEP: human-assisted pure audio (secure) device pairing.

The 11th international conference on Information Security (ISC’08)

A reputation-based trust management system for P2P networks.

International Journal of Network Security


BEDA: button enabled device pairing.

International Workshop on Security for Spontaneous Interaction (IWSSI’07)

Usability analysis of secure pairing methods

Financial Cryptography and Data Security


Loud And Clear: Human-Verifiable Authentication Based on Audio

The 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06)


A reputation based trust management system for P2P networks

The 4th IEEE International Symposium on Cluster Computing and the Grid (CCGRID'04)