Ersin Uzun
Katherine Johnson Endowed Executive Director
Ersin Uzun
Katherine Johnson Endowed Executive Director
Bio
Ersin Uzun is the Katherine Johnson Endowed Executive Director of the Global Cybersecurity Institute and a Professor in the Department of Cybersecurity. He received his MS, PhD degrees from the Department of Computer Science at the University of California, Irvine. His research interests include Usable Security/Privacy, Applied Cryptography and IoT/Networking Security. Dr. Uzun has over 150 patents and publications in the fields of networking, security and privacy.
Select Scholarship
Publications:
SJ Sohrawardi, C Schwartz, E Uzun, M Wright; DeFake: Developing a Usable Tool for Deepfake Awareness and Identification; Human Computer Interaction Consortium 2023
C Ghali, G Tsudik, E Uzun; In Content We Trust: Network-Layer Trust in Content-Centric Networking; IEEE/ACM Transactions on Networking 2019
V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun; Achieving differential privacy in secure multiparty data aggregation protocols on star networks; ACM on Conference on Data and Application Security and Privacy 2017
E Ngai, B Ohlman, G Tsudik, E Uzun, M Wählisch, CA Wood; Can we make a cake and eat it too? A discussion of ICN security and privacy; ACM SIGCOMM Computer Communication Review 2017
C Ghali, G Tsudik, E Uzun, CA Wood; Closing the floodgate with stateless content-centric networking; International Conference on Computer Communication and Networks 2017
M Mosko, E Uzun, CA Wood; Mobile sessions in content-centric networks; IFIP Networking Conference 2017
G Tsudik, E Uzun, CA Wood; Ac3n: Anonymous communication in content-centric networking; IEEE Annual Consumer Communications & Networking Conference 2016
E Ngai, B Ohlman, G Tsudik, E Uzun; Information-centric Networking and Security (Dagstuhl Seminar 16251) Dagstuhl Reports 2016
C Tschudin, E Uzun, CA Wood; Trust in information-centric networking: From theory to practice; International Conference on Computer Communication and Networks 2016
J Kuriharay, E Uzun, CA Wood; An encryption-based access control framework for content centric networking; IFIP networking conference 2015
C Ghali, G Tsudik, E Uzun, CA Wood; Living in a PIT-less World: A Case against Stateful Forwarding in Content-Centric Networking; The Computing Research Repository abs/1512.07755 2015
S Rane, J Freudiger, AE Brito, E Uzun; Privacy, efficiency & fault tolerance in aggregate computations on massive star networks; IEEE International Workshop on Information Forensics and Security 2015
S Rane, E Uzun; A fuzzy commitment approach to privacy preserving behavioral targeting; ACM MobiCom workshop on Security and privacy 2014
P Mahadevan, E Uzun, S Sevilla, JJ Garcia-Luna-Aceves CCN-krs: A key resolution service for CCN; Proceedings of the 1st ACM Conference on Information-Centric Networking 2014
CA Wood, E Uzun; Flexible end-to-end content security in CCN; IEEE 11th Consumer Communications and Networking Conference 2014
C Ghali, G Tsudik, E Uzun; Needle in a haystack: Mitigating content poisoning in named-data networking; NDSS Workshop on Security of Emerging Networking Technologies 2014
C Ghali, G Tsudik, E Uzun; Network-layer trust in named-data networking; ACM SIGCOMM Computer Communication Review 2014
J Freudiger, S Rane, AE Brito, E Uzun; Privacy preserving data quality assessment for high-fidelity data sharing; ACM Workshop on Information Sharing & Collaboration 2014
I Bilogrevic, J Freudiger, E De Dristofaro, E Uzun; What’s the gist? Privacy-preserving aggregation of user profiles; European Symposium on Research in Computer Security 2014
A Kobsa, R Nithyanand, G Tsudik, E Uzun; Can Jannie verify? Usability of display-equipped RFID tags for security purposes; Journal of computer security 2013
C Bian, Z Zhu, A Afanasyev, E Uzun, L Zhang; Deploying key management on NDN testbed; UCLA, Peking University and PARC, Tech Report 2013
E Uzun, P Gasti, G Tsudik, L Zhang; DoS & DDoS in Named Data Networking Computer Communications and Networks 2013
A Afanasyev, P Mahadevan, I Moiseenko, E Uzun, L Zhang; Interest flooding attack and countermeasures in Named Data Networking; IFIP Networking Conference 2013
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun; Privacy in content-oriented networking: Threats and countermeasures; ACM SIGCOMM Computer Communication Review 2013
S DiBenedetto, P Gasti, G Tsudik, E Uzun; ANDaNA: Anonymous named data networking application; The Network and Distributed System Security Symposium 2012
S Barber, X Boyen, E Shi, E Uzun; Bitter to better—how to make bitcoin a better currency; International conference on financial cryptography and data security 2012
V Jacobson et al.; Custodian-based information sharing; IEEE Communications Magazine 2012
K Partridge, MA Pathak, E Uzun, C Wang; Picoda: Privacy-preserving smart coupon delivery architecture; The 5th Workshop on Hot Topics in Privacy Enhancing Technologies 2012
R Chow, E Uzun, AA Cárdenas, Z Song, S Lee; Enhancing cyber-physical security through data patterns; Workshop on Foundations of Dependable and Secure Cyber-Physical Systems 2011
E Uzun, N Saxena, A Kumar; Pairing devices for social interactions: a comparative usability evaluation; SIGCHI Conference on Human Factors in Computing Systems 2011
A Kobsa, R Nithyanand, G Tsudik, E Uzun; Usability of display-equipped rfid tags for security purposes; European Symposium on Research in Computer Security 2011
R Nithyanand, G Tsudik, E Uzun; User-aided reader revocation in PKI-based RFID systems; Journal of Computer Security 2011
R Nithyanand, N Saxena, G Tsudik, E Uzun; Groupthink: Usability of secure group association for wireless devices; ACM international conference on Ubiquitous computing 2010
R Nithyanand, G Tsudik, E Uzun; Readers behaving badly; European Symposium on Research in Computer Security 2010
M Wilhelm, I Martinovic, E Uzun, JB Schmitt; SUDOKU: Secure and usable deployment of keys on wireless sensors; IEEE workshop on secure network protocols 2010
A Kumar, N Saxena, G Tsudik, E Uzun; A comparative study of secure device pairing methods; Pervasive and Mobile Computing 2009
A Kumar, N Saxena, E Uzun; Alice meets bob: A comparative usability study of wireless device pairing methods for a two-user setting; Computing Research Repository 2009
A Kumar, N Saxena, G Tsudik, E Uzun; Caveat eptor: A comparative study of secure device pairing methods; IEEE International Conference on Pervasive Computing and Communications 2009
M Cagalj, N Saxena, E Uzun; On the usability of secure association of wireless devices based on distance bounding; International Conference on Cryptology and Network Security 2009
C Soriente, G Tsudik, E Uzun; Secure pairing of interface constrained devices International Journal of Security and Networks 4 (1-2) 2009
C Soriente, G Tsudik, E Uzun; BEDA: Button-enabled device association; Security for Spontaneous Interaction Workshop 2007
K Kostiainen, E Uzun, N Asokan, P Ginzboorg; Framework for comparative usability testing of distributed applications; Security User Studies: Methodologies and Best Practices Workshop 2007
E Uzun, K Karvonen, N Asokan; Usability analysis of secure pairing methods International Conference on Financial Cryptography and Data Security 2007
MT Goodrich, M Sirivianos, J Solis, G Tsudik, E Uzun; Loud and clear: Human verifiable authentication based on audio; IEEE International Conference on Distributed Computing Systems 2006
AA Selcuk, E Uzun, MR Pariente; A reputation based trust management system for P2P networks; IEEE International Symposium on Cluster Computing and the Grid 2004
Patents:
The list of 100+ patents can be found here .