这是indexloc提供的服务,不要输入任何密码

BibTeX records: Ersin Uzun

download as .bib file

@article{DBLP:journals/ton/GhaliTU19,
  author       = {Cesar Ghali and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {In Content We Trust: Network-Layer Trust in Content-Centric Networking},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {27},
  number       = {5},
  pages        = {1787--1800},
  year         = {2019},
  url          = {https://doi.org/10.1109/TNET.2019.2926320},
  doi          = {10.1109/TNET.2019.2926320},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/GhaliTU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/NgaiOTUWW17,
  author       = {Edith C. H. Ngai and
                  B{\"{o}}rje Ohlman and
                  Gene Tsudik and
                  Ersin Uzun and
                  Matthias W{\"{a}}hlisch and
                  Christopher A. Wood},
  title        = {Can We Make a Cake and Eat it Too? {A} Discussion of {ICN} Security
                  and Privacy},
  journal      = {Comput. Commun. Rev.},
  volume       = {47},
  number       = {1},
  pages        = {49--54},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041027.3041034},
  doi          = {10.1145/3041027.3041034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/NgaiOTUWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BindschaedlerRB17,
  author       = {Vincent Bindschaedler and
                  Shantanu Rane and
                  Alejandro E. Brito and
                  Vanishree Rao and
                  Ersin Uzun},
  title        = {Achieving Differential Privacy in Secure Multiparty Data Aggregation
                  Protocols on Star Networks},
  booktitle    = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  pages        = {115--125},
  year         = {2017},
  crossref     = {DBLP:conf/codaspy/2017},
  url          = {https://doi.org/10.1145/3029806.3029829},
  doi          = {10.1145/3029806.3029829},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BindschaedlerRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GhaliTUW17,
  author       = {Cesar Ghali and
                  Gene Tsudik and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {Closing the Floodgate with Stateless Content-Centric Networking},
  booktitle    = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  pages        = {1--10},
  year         = {2017},
  crossref     = {DBLP:conf/icccn/2017},
  url          = {https://doi.org/10.1109/ICCCN.2017.8038367},
  doi          = {10.1109/ICCCN.2017.8038367},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/GhaliTUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MoskoUW17,
  author       = {Marc Mosko and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {Mobile sessions in content-centric networks},
  booktitle    = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
                  Stockholm, Sweden, June 12-16, 2017},
  pages        = {1--9},
  year         = {2017},
  crossref     = {DBLP:conf/networking/2017},
  url          = {https://doi.org/10.23919/IFIPNetworking.2017.8264861},
  doi          = {10.23919/IFIPNETWORKING.2017.8264861},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/MoskoUW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/TsudikUW16,
  author       = {Gene Tsudik and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {{AC3N:} Anonymous communication in Content-Centric Networking},
  booktitle    = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
  pages        = {988--991},
  year         = {2016},
  crossref     = {DBLP:conf/ccnc/2016},
  url          = {https://doi.org/10.1109/CCNC.2016.7444924},
  doi          = {10.1109/CCNC.2016.7444924},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/TsudikUW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/TschudinUW16,
  author       = {Christian F. Tschudin and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {Trust in Information-Centric Networking: From Theory to Practice},
  booktitle    = {25th International Conference on Computer Communication and Networks,
                  {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  pages        = {1--9},
  year         = {2016},
  crossref     = {DBLP:conf/icccn/2016},
  url          = {https://doi.org/10.1109/ICCCN.2016.7568589},
  doi          = {10.1109/ICCCN.2016.7568589},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/TschudinUW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/NgaiOTU16,
  author       = {Edith C. H. Ngai and
                  B{\"{o}}rje Ohlman and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Information-centric Networking and Security (Dagstuhl Seminar 16251)},
  journal      = {Dagstuhl Reports},
  volume       = {6},
  number       = {6},
  pages        = {49--61},
  year         = {2016},
  url          = {https://doi.org/10.4230/DagRep.6.6.49},
  doi          = {10.4230/DAGREP.6.6.49},
  timestamp    = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/NgaiOTU16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KuriharayUW15,
  author       = {Jun Kurihara and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {An encryption-based access control framework for content-centric networking},
  booktitle    = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015,
                  Toulouse, France, 20-22 May, 2015},
  pages        = {1--9},
  year         = {2015},
  crossref     = {DBLP:conf/networking/2015},
  url          = {https://doi.org/10.1109/IFIPNetworking.2015.7145300},
  doi          = {10.1109/IFIPNETWORKING.2015.7145300},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/KuriharayUW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RaneFBU15,
  author       = {Shantanu Rane and
                  Julien Freudiger and
                  Alejandro E. Brito and
                  Ersin Uzun},
  title        = {Privacy, efficiency {\&} fault tolerance in aggregate computations
                  on massive star networks},
  booktitle    = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  pages        = {1--6},
  year         = {2015},
  crossref     = {DBLP:conf/wifs/2015},
  url          = {https://doi.org/10.1109/WIFS.2015.7368608},
  doi          = {10.1109/WIFS.2015.7368608},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/RaneFBU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhaliTUW15,
  author       = {Cesar Ghali and
                  Gene Tsudik and
                  Ersin Uzun and
                  Christopher A. Wood},
  title        = {Living in a PIT-less World: {A} Case Against Stateful Forwarding in
                  Content-Centric Networking},
  journal      = {CoRR},
  volume       = {abs/1512.07755},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07755},
  eprinttype    = {arXiv},
  eprint       = {1512.07755},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhaliTUW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/GhaliTU14,
  author       = {Cesar Ghali and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Network-Layer Trust in Named-Data Networking},
  journal      = {Comput. Commun. Rev.},
  volume       = {44},
  number       = {5},
  pages        = {12--19},
  year         = {2014},
  url          = {https://doi.org/10.1145/2677046.2677049},
  doi          = {10.1145/2677046.2677049},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/GhaliTU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmicn/MahadevanUSG14,
  author       = {Priya Mahadevan and
                  Ersin Uzun and
                  Spencer Sevilla and
                  J. J. Garcia{-}Luna{-}Aceves},
  title        = {{CCN-KRS:} a key resolution service for {CCN}},
  booktitle    = {1st International Conference on Information-Centric Networking, ICN'14,
                  Paris, France, September 24-26, 2014},
  pages        = {97--106},
  year         = {2014},
  crossref     = {DBLP:conf/acmicn/2014},
  url          = {https://doi.org/10.1145/2660129.2660154},
  doi          = {10.1145/2660129.2660154},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acmicn/MahadevanUSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FreudigerRBU14,
  author       = {Julien Freudiger and
                  Shantanu Rane and
                  Alejandro E. Brito and
                  Ersin Uzun},
  title        = {Privacy Preserving Data Quality Assessment for High-Fidelity Data
                  Sharing},
  booktitle    = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {21--29},
  year         = {2014},
  crossref     = {DBLP:conf/ccs/2014wiscs},
  url          = {https://doi.org/10.1145/2663876.2663885},
  doi          = {10.1145/2663876.2663885},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FreudigerRBU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BilogrevicFCU14,
  author       = {Igor Bilogrevic and
                  Julien Freudiger and
                  Emiliano De Cristofaro and
                  Ersin Uzun},
  title        = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  pages        = {128--145},
  year         = {2014},
  crossref     = {DBLP:conf/esorics/2014-2},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_8},
  doi          = {10.1007/978-3-319-11212-1\_8},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BilogrevicFCU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/RaneU14,
  author       = {Shantanu Rane and
                  Ersin Uzun},
  title        = {A fuzzy commitment approach to privacy preserving behavioral targeting},
  booktitle    = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
                  in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
                  11, 2014},
  pages        = {31--36},
  year         = {2014},
  crossref     = {DBLP:conf/mobicom/2014spme},
  url          = {https://doi.org/10.1145/2646584.2646591},
  doi          = {10.1145/2646584.2646591},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/RaneU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2014spme,
  editor       = {Ersin Uzun and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
                  in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
                  11, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2646584},
  doi          = {10.1145/2646584},
  isbn         = {978-1-4503-3075-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/2014spme.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhaliTU14,
  author       = {Cesar Ghali and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Elements of Trust in Named-Data Networking},
  journal      = {CoRR},
  volume       = {abs/1402.3332},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.3332},
  eprinttype    = {arXiv},
  eprint       = {1402.3332},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhaliTU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BilogrevicFCU14,
  author       = {Igor Bilogrevic and
                  Julien Freudiger and
                  Emiliano De Cristofaro and
                  Ersin Uzun},
  title        = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
  journal      = {CoRR},
  volume       = {abs/1405.1328},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.1328},
  eprinttype    = {arXiv},
  eprint       = {1405.1328},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BilogrevicFCU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilogrevicFCU14,
  author       = {Igor Bilogrevic and
                  Julien Freudiger and
                  Emiliano De Cristofaro and
                  Ersin Uzun},
  title        = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {502},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/502},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilogrevicFCU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/AbdelberiCKU13,
  author       = {Chaabane Abdelberi and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Ersin Uzun},
  title        = {Privacy in content-oriented networking: threats and countermeasures},
  journal      = {Comput. Commun. Rev.},
  volume       = {43},
  number       = {3},
  pages        = {25--33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2500098.2500102},
  doi          = {10.1145/2500098.2500102},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccr/AbdelberiCKU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KobsaNTU13,
  author       = {Alfred Kobsa and
                  Rishab Nithyanand and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Can Jannie verify? Usability of display-equipped {RFID} tags for security
                  purposes},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {3},
  pages        = {347--370},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130470},
  doi          = {10.3233/JCS-130470},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KobsaNTU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GastiTU013,
  author       = {Paolo Gasti and
                  Gene Tsudik and
                  Ersin Uzun and
                  Lixia Zhang},
  title        = {DoS and DDoS in Named Data Networking},
  booktitle    = {22nd International Conference on Computer Communication and Networks,
                  {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  pages        = {1--7},
  year         = {2013},
  crossref     = {DBLP:conf/icccn/2013},
  url          = {https://doi.org/10.1109/ICCCN.2013.6614127},
  doi          = {10.1109/ICCCN.2013.6614127},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/GastiTU013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/AfanasyevMMU013,
  author       = {Alexander Afanasyev and
                  Priya Mahadevan and
                  Ilya Moiseenko and
                  Ersin Uzun and
                  Lixia Zhang},
  title        = {Interest flooding attack and countermeasures in Named Data Networking},
  booktitle    = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24
                  May, 2013},
  pages        = {1--9},
  year         = {2013},
  crossref     = {DBLP:conf/networking/2013},
  url          = {https://ieeexplore.ieee.org/document/6663516/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/networking/AfanasyevMMU013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/JacobsonBDMMBBPSULJBST12,
  author       = {Van Jacobson and
                  Rebecca Braynard and
                  Tim Diebert and
                  Priya Mahadevan and
                  Marc Mosko and
                  Nicholas H. Briggs and
                  Simon Barber and
                  Michael F. Plass and
                  Ignacio Solis and
                  Ersin Uzun and
                  Byoung{-}Joon Lee and
                  Myeong{-}Wuk Jang and
                  Dojun Byun and
                  Diana K. Smetters and
                  James D. Thornton},
  title        = {Custodian-based information sharing},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {50},
  number       = {7},
  pages        = {38--43},
  year         = {2012},
  url          = {https://doi.org/10.1109/MCOM.2012.6231277},
  doi          = {10.1109/MCOM.2012.6231277},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/JacobsonBDMMBBPSULJBST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarberBSU12,
  author       = {Simon Barber and
                  Xavier Boyen and
                  Elaine Shi and
                  Ersin Uzun},
  title        = {Bitter to Better - How to Make Bitcoin a Better Currency},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  pages        = {399--414},
  year         = {2012},
  crossref     = {DBLP:conf/fc/2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_29},
  doi          = {10.1007/978-3-642-32946-3\_29},
  timestamp    = {Tue, 30 Jul 2024 10:38:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarberBSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DiBenedettoGTU12,
  author       = {Steve DiBenedetto and
                  Paolo Gasti and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {ANDaNA: Anonymous Named Data Networking Application},
  booktitle    = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  year         = {2012},
  crossref     = {DBLP:conf/ndss/2012},
  url          = {https://www.ndss-symposium.org/ndss2012/andana-anonymous-named-data-networking-application},
  timestamp    = {Mon, 01 Feb 2021 08:42:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/DiBenedettoGTU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-0952,
  author       = {Paolo Gasti and
                  Gene Tsudik and
                  Ersin Uzun and
                  Lixia Zhang},
  title        = {DoS and DDoS in Named-Data Networking},
  journal      = {CoRR},
  volume       = {abs/1208.0952},
  year         = {2012},
  url          = {http://arxiv.org/abs/1208.0952},
  eprinttype    = {arXiv},
  eprint       = {1208.0952},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1208-0952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-5183,
  author       = {Chaabane Abdelberi and
                  Emiliano De Cristofaro and
                  Mohamed Ali K{\^{a}}afar and
                  Ersin Uzun},
  title        = {Privacy in Content-Oriented Networking: Threats and Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1211.5183},
  year         = {2012},
  url          = {http://arxiv.org/abs/1211.5183},
  eprinttype    = {arXiv},
  eprint       = {1211.5183},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1211-5183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NithyanandTU11,
  author       = {Rishab Nithyanand and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {User-aided reader revocation in PKI-based {RFID} systems},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {6},
  pages        = {1147--1172},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0435},
  doi          = {10.3233/JCS-2011-0435},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/NithyanandTU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/UzunSK11,
  author       = {Ersin Uzun and
                  Nitesh Saxena and
                  Arun Kumar},
  title        = {Pairing devices for social interactions: a comparative usability evaluation},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2315--2324},
  year         = {2011},
  crossref     = {DBLP:conf/chi/2011},
  url          = {https://doi.org/10.1145/1978942.1979282},
  doi          = {10.1145/1978942.1979282},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/UzunSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KobsaNTU11,
  author       = {Alfred Kobsa and
                  Rishab Nithyanand and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Usability of Display-Equipped {RFID} Tags for Security Purposes},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  pages        = {434--451},
  year         = {2011},
  crossref     = {DBLP:conf/esorics/2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_24},
  doi          = {10.1007/978-3-642-23822-2\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KobsaNTU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2205,
  author       = {Steve DiBenedetto and
                  Paolo Gasti and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {ANDaNA: Anonymous Named Data Networking Application},
  journal      = {CoRR},
  volume       = {abs/1112.2205},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.2205},
  eprinttype    = {arXiv},
  eprint       = {1112.2205},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-2205.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NithyanandTU10,
  author       = {Rishab Nithyanand and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Readers Behaving Badly - Reader Revocation in PKI-Based {RFID} Systems},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages        = {19--36},
  year         = {2010},
  crossref     = {DBLP:conf/esorics/2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_2},
  doi          = {10.1007/978-3-642-15497-3\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NithyanandTU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/NithyanandSTU10,
  author       = {Rishab Nithyanand and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Groupthink: usability of secure group association for wireless devices},
  booktitle    = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
                  UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
  pages        = {331--340},
  year         = {2010},
  crossref     = {DBLP:conf/huc/2010},
  url          = {https://doi.org/10.1145/1864349.1864399},
  doi          = {10.1145/1864349.1864399},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/NithyanandSTU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SorienteTU09,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Secure pairing of interface constrained devices},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {17--26},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023423},
  doi          = {10.1504/IJSN.2009.023423},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GoodrichSSSTU09,
  author       = {Michael T. Goodrich and
                  Michael Sirivianos and
                  John Solis and
                  Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Using audio in secure device pairing},
  journal      = {Int. J. Secur. Networks},
  volume       = {4},
  number       = {1/2},
  pages        = {57--68},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJSN.2009.023426},
  doi          = {10.1504/IJSN.2009.023426},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KumarSTU09,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {A comparative study of secure device pairing methods},
  journal      = {Pervasive Mob. Comput.},
  volume       = {5},
  number       = {6},
  pages        = {734--749},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.pmcj.2009.07.008},
  doi          = {10.1016/J.PMCJ.2009.07.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/KumarSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CagaljSU09,
  author       = {Mario Cagalj and
                  Nitesh Saxena and
                  Ersin Uzun},
  title        = {On the Usability of Secure Association of Wireless Devices Based on
                  Distance Bounding},
  booktitle    = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  pages        = {443--462},
  year         = {2009},
  crossref     = {DBLP:conf/cans/2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6\_30},
  doi          = {10.1007/978-3-642-10433-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CagaljSU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KumarSTU09,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Caveat Emptor: {A} Comparative Study of Secure Device Pairing Methods},
  booktitle    = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
  pages        = {1--10},
  year         = {2009},
  crossref     = {DBLP:conf/percom/2009},
  url          = {https://doi.org/10.1109/PERCOM.2009.4912753},
  doi          = {10.1109/PERCOM.2009.4912753},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/KumarSTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KobsaSTUW09,
  author       = {Alfred Kobsa and
                  Rahim Sonawalla and
                  Gene Tsudik and
                  Ersin Uzun and
                  Yang Wang},
  title        = {Serial hook-ups: a comparative usability study of secure device pairing
                  methods},
  booktitle    = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  year         = {2009},
  crossref     = {DBLP:conf/soups/2009},
  url          = {https://doi.org/10.1145/1572532.1572546},
  doi          = {10.1145/1572532.1572546},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/KobsaSTUW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-4743,
  author       = {Arun Kumar and
                  Nitesh Saxena and
                  Ersin Uzun},
  title        = {Alice Meets Bob: {A} Comparative Usability Study of Wireless Device
                  Pairing Methods for a "Two-User" Setting},
  journal      = {CoRR},
  volume       = {abs/0907.4743},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.4743},
  eprinttype    = {arXiv},
  eprint       = {0907.4743},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-4743.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NithyanandTU09,
  author       = {Rishab Nithyanand and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Readers Behaving Badly: Reader Revocation in PKI-Based {RFID} Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {465},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/465},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NithyanandTU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SelcukUP08,
  author       = {Ali Aydin Sel{\c{c}}uk and
                  Ersin Uzun and
                  Mark Resat Pariente},
  title        = {A Reputation-based Trust Management System for {P2P} Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {227--237},
  year         = {2008},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p227-237.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/SelcukUP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SorienteTU08,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{HAPADEP:} Human-Assisted Pure Audio Device Pairing},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  pages        = {385--400},
  year         = {2008},
  crossref     = {DBLP:conf/isw/2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_27},
  doi          = {10.1007/978-3-540-85886-7\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SorienteTU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/UzunKA07,
  author       = {Ersin Uzun and
                  Kristiina Karvonen and
                  N. Asokan},
  title        = {Usability Analysis of Secure Pairing Methods},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  pages        = {307--324},
  year         = {2007},
  crossref     = {DBLP:conf/fc/2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_29},
  doi          = {10.1007/978-3-540-77366-5\_29},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/UzunKA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{HAPADEP:} Human Asisted Pure Audio Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07a,
  author       = {Claudio Soriente and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {{BEDA:} Button-Enabled Device Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {246},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GoodrichSSTU06,
  author       = {Michael T. Goodrich and
                  Michael Sirivianos and
                  John Solis and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
  booktitle    = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  pages        = {10},
  year         = {2006},
  crossref     = {DBLP:conf/icdcs/2006},
  url          = {https://doi.org/10.1109/ICDCS.2006.52},
  doi          = {10.1109/ICDCS.2006.52},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/GoodrichSSTU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodrichSSTU05,
  author       = {Michael T. Goodrich and
                  Michael Sirivianos and
                  John Solis and
                  Gene Tsudik and
                  Ersin Uzun},
  title        = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {428},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/428},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoodrichSSTU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SelcukUP04,
  author       = {Ali Aydin Sel{\c{c}}uk and
                  Ersin Uzun and
                  Mark Resat Pariente},
  title        = {A reputation-based trust management system for {P2P} networks},
  booktitle    = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
  pages        = {251--258},
  year         = {2004},
  crossref     = {DBLP:conf/ccgrid/2004},
  url          = {https://doi.org/10.1109/CCGrid.2004.1336575},
  doi          = {10.1109/CCGRID.2004.1336575},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/SelcukUP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor       = {Gail{-}Joon Ahn and
                  Alexander Pretschner and
                  Gabriel Ghinita},
  title        = {Proceedings of the Seventh {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
                  2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn         = {978-1-4503-4523-1},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2017,
  title        = {26th International Conference on Computer Communication and Networks,
                  {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8038296/proceeding},
  isbn         = {978-1-5090-2991-4},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2017,
  title        = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
                  Stockholm, Sweden, June 12-16, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8253906/proceeding},
  isbn         = {978-3-901882-94-4},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccnc/2016,
  title        = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7435634/proceeding},
  isbn         = {978-1-4673-9292-1},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2016,
  title        = {25th International Conference on Computer Communication and Networks,
                  {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7566809/proceeding},
  isbn         = {978-1-5090-2279-3},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2015,
  editor       = {Rahim Kacimi and
                  Zoubir Mammeri},
  title        = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015,
                  Toulouse, France, 20-22 May, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7128766/proceeding},
  isbn         = {978-3-901882-68-5},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
  title        = {2015 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2015, Roma, Italy, November 16-19, 2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7364553/proceeding},
  isbn         = {978-1-4673-6802-5},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/wifs/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acmicn/2014,
  editor       = {Giovanna Carofiglio and
                  Luca Muscariello and
                  Lixia Zhang and
                  Dirk Kutscher},
  title        = {1st International Conference on Information-Centric Networking, ICN'14,
                  Paris, France, September 24-26, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {http://dl.acm.org/citation.cfm?id=2660129},
  isbn         = {978-1-4503-3206-4},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/acmicn/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014wiscs,
  editor       = {Gail{-}Joon Ahn and
                  Tomas Sander},
  title        = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663876},
  doi          = {10.1145/2663876},
  isbn         = {978-1-4503-3151-7},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014wiscs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1},
  doi          = {10.1007/978-3-319-11212-1},
  isbn         = {978-3-319-11211-4},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2014-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2014spme,
  editor       = {Ersin Uzun and
                  Mohamed Ali K{\^{a}}afar},
  title        = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
                  in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
                  11, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2646584},
  doi          = {10.1145/2646584},
  isbn         = {978-1-4503-3075-6},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/2014spme.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2013,
  title        = {22nd International Conference on Computer Communication and Networks,
                  {ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6603810/proceeding},
  isbn         = {978-1-4673-5774-6},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2013,
  title        = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24
                  May, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6656124/proceeding},
  isbn         = {978-3-901882-55-5},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/networking/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012,
  editor       = {Angelos D. Keromytis},
  title        = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3},
  doi          = {10.1007/978-3-642-32946-3},
  isbn         = {978-3-642-32945-6},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2012,
  title        = {19th Annual Network and Distributed System Security Symposium, {NDSS}
                  2012, San Diego, California, USA, February 5-8, 2012},
  publisher    = {The Internet Society},
  year         = {2012},
  url          = {https://www.ndss-symposium.org/ndss2012/},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2011,
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942},
  doi          = {10.1145/1978942},
  isbn         = {978-1-4503-0228-9},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011,
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2},
  doi          = {10.1007/978-3-642-23822-2},
  isbn         = {978-3-642-23821-5},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3},
  doi          = {10.1007/978-3-642-15497-3},
  isbn         = {978-3-642-15496-6},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/huc/2010,
  editor       = {Jakob E. Bardram and
                  Marc Langheinrich and
                  Khai N. Truong and
                  Paddy Nixon},
  title        = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
                  UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-60558-843-8},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2009,
  editor       = {Juan A. Garay and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Cryptology and Network Security, 8th International Conference, {CANS}
                  2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5888},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10433-6},
  doi          = {10.1007/978-3-642-10433-6},
  isbn         = {978-3-642-10432-9},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2009,
  title        = {Seventh Annual {IEEE} International Conference on Pervasive Computing
                  and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/4906860/proceeding},
  isbn         = {978-1-4244-3304-9},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soups/2009,
  editor       = {Lorrie Faith Cranor},
  title        = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
                  2009, Mountain View, California, USA, July 15-17, 2009},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-736-3},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2008,
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7},
  doi          = {10.1007/978-3-540-85886-7},
  isbn         = {978-3-540-85884-3},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2007,
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77366-5},
  doi          = {10.1007/978-3-540-77366-5},
  isbn         = {978-3-540-77365-8},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2006,
  title        = {26th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10967/proceeding},
  isbn         = {0-7695-2540-7},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccgrid/2004,
  title        = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9282/proceeding},
  isbn         = {0-7803-8430-X},
  timestamp    = {Sat, 15 Nov 2025 12:17:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}