homepeopleersin uzun › publications

PROFILE:

 

 

PARC publications

view publications by:  date | title | type | focus area

 

A Fuzzy Commitment Approach to Privacy Preserving Behavioral Targeting

Workshop on Security and Privacy aspects of Mobile Environments (SPME 2014)

11 September 2014

ANDaNA: Anonymous Named Data Networking Application

Annual Network & Distributed System Security Symposium (NDSS)

5 February 2012

Bitter to better - how to make Bitcoin a better currency

16th International Conference on Financial Cryptography and Data Security

27 February 2012

CCN-KRS: A Key Resolution Service for CCN

ACM Information Centric Networking Conference

24 September 2014

Custodian-based information sharing

IEEE Communications Magazine special issue on Information-Centric Networking

July 2012

DoS & DDoS in Named Data Networking

International Conference on Computer Communications and Networks

31 July 2013

Enhancing cyber-physical security through data patterns

Workshop on Foundations of Dependable and Secure Cyber-Physical Systems

11 April 2011

Flexible End-to-End Content Security in CCN

IEEE Consumer Communications & Networking Conference

11 January 2014

Interest flooding attack and countermeasures in Named Data Networking

Proceedings of the IFIP/IEEE Networking 2013 Conference

22 May 2013

Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking

NDSS Workshop on Security of Emerging Networking Technologies

23 February 2014

Network-Layer Trust in Named-Data Networking

ACM SIGCOMM Computer Communication Review Magazine

27 October 2014

PiCoDa: privacy-preserving smart coupon delivery architecture

5th Workshop on Hot Topics in Privacy-Preserving Technologies (HotPETS 2012)

13 July 2012

Privacy in content-oriented networking

ACM SIGCOMM 2013

13 August 2013

Privacy Preserving Data Quality Assessment

ACM Workshop on Information Sharing and Collaborative Security (WISCS)

3 November 2014

Usability of display-equipped RFID tags for security purposes

European Symposium on Research in Computer Security (ESORICS)

13 September 2011

User-aided reader revocation in PKI-based RFID systems

Journal of Computer Security

15 December 2011

 

 

 

other publications

view publications by:  date | title

 

A comparative study of secure device pairing methods

The Pervasive and Mobile Computing Journal (PMC)

A reputation based trust management system for P2P networks

The 4th IEEE International Symposium on Cluster Computing and the Grid (CCGRID'04)

A reputation-based trust management system for P2P networks.

International Journal of Network Security

BEDA: button enabled device pairing.

International Workshop on Security for Spontaneous Interaction (IWSSI’07)

Caveat Emptor: a comparative study of secure device pairing methods.

The 7th IEEE International Conference on Pervasive Computing and Communications (PerCom’09)

Groupthink: on the usability of secure group association of wireless devices

12th ACM International Conference on Ubiquitous Computing (Ubicomp'10)

HAPADEP: human-assisted pure audio (secure) device pairing.

The 11th international conference on Information Security (ISC’08)

Loud And Clear: Human-Verifiable Authentication Based on Audio

The 26th IEEE International Conference on Distributed Computing Systems (ICDCS’06)

On the usability of wireless device authentication based on distance bounding

The 8th International Conference on Cryptology And Network Security (CANS'09)

Readers behaving badly: reader revocation in PKI-based RFID systems

15th European Symposium on Research in Computer Security (ESORICS'10)

Secure pairing of interface constrained devices

International Journal on Security and Networks

Serial Hook-Ups: a comparative usability study of secure device pairing methods

The Fifth Symposium on Usable Privacy and Security (SOUPS’09).

SUDOKU: secure and usable deployment of keys on wireless sensors.

Sixth Workshop on Secure Network Protocols (NPSEC'10)

Usability analysis of secure pairing methods

Financial Cryptography and Data Security

Using audio in secure device pairing

International Journal on Security and Networks