default search action
BibTeX records: Ersin Uzun
@article{DBLP:journals/ton/GhaliTU19,
author = {Cesar Ghali and
Gene Tsudik and
Ersin Uzun},
title = {In Content We Trust: Network-Layer Trust in Content-Centric Networking},
journal = {{IEEE/ACM} Trans. Netw.},
volume = {27},
number = {5},
pages = {1787--1800},
year = {2019},
url = {https://doi.org/10.1109/TNET.2019.2926320},
doi = {10.1109/TNET.2019.2926320},
timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ton/GhaliTU19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/NgaiOTUWW17,
author = {Edith C. H. Ngai and
B{\"{o}}rje Ohlman and
Gene Tsudik and
Ersin Uzun and
Matthias W{\"{a}}hlisch and
Christopher A. Wood},
title = {Can We Make a Cake and Eat it Too? {A} Discussion of {ICN} Security
and Privacy},
journal = {Comput. Commun. Rev.},
volume = {47},
number = {1},
pages = {49--54},
year = {2017},
url = {https://doi.org/10.1145/3041027.3041034},
doi = {10.1145/3041027.3041034},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ccr/NgaiOTUWW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BindschaedlerRB17,
author = {Vincent Bindschaedler and
Shantanu Rane and
Alejandro E. Brito and
Vanishree Rao and
Ersin Uzun},
title = {Achieving Differential Privacy in Secure Multiparty Data Aggregation
Protocols on Star Networks},
booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application
Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
2017},
pages = {115--125},
year = {2017},
crossref = {DBLP:conf/codaspy/2017},
url = {https://doi.org/10.1145/3029806.3029829},
doi = {10.1145/3029806.3029829},
timestamp = {Tue, 07 May 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/codaspy/BindschaedlerRB17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GhaliTUW17,
author = {Cesar Ghali and
Gene Tsudik and
Ersin Uzun and
Christopher A. Wood},
title = {Closing the Floodgate with Stateless Content-Centric Networking},
booktitle = {26th International Conference on Computer Communication and Networks,
{ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
pages = {1--10},
year = {2017},
crossref = {DBLP:conf/icccn/2017},
url = {https://doi.org/10.1109/ICCCN.2017.8038367},
doi = {10.1109/ICCCN.2017.8038367},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/icccn/GhaliTUW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/MoskoUW17,
author = {Marc Mosko and
Ersin Uzun and
Christopher A. Wood},
title = {Mobile sessions in content-centric networks},
booktitle = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
Stockholm, Sweden, June 12-16, 2017},
pages = {1--9},
year = {2017},
crossref = {DBLP:conf/networking/2017},
url = {https://doi.org/10.23919/IFIPNetworking.2017.8264861},
doi = {10.23919/IFIPNETWORKING.2017.8264861},
timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/networking/MoskoUW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/TsudikUW16,
author = {Gene Tsudik and
Ersin Uzun and
Christopher A. Wood},
title = {{AC3N:} Anonymous communication in Content-Centric Networking},
booktitle = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
{CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
pages = {988--991},
year = {2016},
crossref = {DBLP:conf/ccnc/2016},
url = {https://doi.org/10.1109/CCNC.2016.7444924},
doi = {10.1109/CCNC.2016.7444924},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/ccnc/TsudikUW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/TschudinUW16,
author = {Christian F. Tschudin and
Ersin Uzun and
Christopher A. Wood},
title = {Trust in Information-Centric Networking: From Theory to Practice},
booktitle = {25th International Conference on Computer Communication and Networks,
{ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
pages = {1--9},
year = {2016},
crossref = {DBLP:conf/icccn/2016},
url = {https://doi.org/10.1109/ICCCN.2016.7568589},
doi = {10.1109/ICCCN.2016.7568589},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/icccn/TschudinUW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/NgaiOTU16,
author = {Edith C. H. Ngai and
B{\"{o}}rje Ohlman and
Gene Tsudik and
Ersin Uzun},
title = {Information-centric Networking and Security (Dagstuhl Seminar 16251)},
journal = {Dagstuhl Reports},
volume = {6},
number = {6},
pages = {49--61},
year = {2016},
url = {https://doi.org/10.4230/DagRep.6.6.49},
doi = {10.4230/DAGREP.6.6.49},
timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dagstuhl-reports/NgaiOTU16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/KuriharayUW15,
author = {Jun Kurihara and
Ersin Uzun and
Christopher A. Wood},
title = {An encryption-based access control framework for content-centric networking},
booktitle = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015,
Toulouse, France, 20-22 May, 2015},
pages = {1--9},
year = {2015},
crossref = {DBLP:conf/networking/2015},
url = {https://doi.org/10.1109/IFIPNetworking.2015.7145300},
doi = {10.1109/IFIPNETWORKING.2015.7145300},
timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/networking/KuriharayUW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/RaneFBU15,
author = {Shantanu Rane and
Julien Freudiger and
Alejandro E. Brito and
Ersin Uzun},
title = {Privacy, efficiency {\&} fault tolerance in aggregate computations
on massive star networks},
booktitle = {2015 {IEEE} International Workshop on Information Forensics and Security,
{WIFS} 2015, Roma, Italy, November 16-19, 2015},
pages = {1--6},
year = {2015},
crossref = {DBLP:conf/wifs/2015},
url = {https://doi.org/10.1109/WIFS.2015.7368608},
doi = {10.1109/WIFS.2015.7368608},
timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
biburl = {https://dblp.org/rec/conf/wifs/RaneFBU15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhaliTUW15,
author = {Cesar Ghali and
Gene Tsudik and
Ersin Uzun and
Christopher A. Wood},
title = {Living in a PIT-less World: {A} Case Against Stateful Forwarding in
Content-Centric Networking},
journal = {CoRR},
volume = {abs/1512.07755},
year = {2015},
url = {http://arxiv.org/abs/1512.07755},
eprinttype = {arXiv},
eprint = {1512.07755},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/GhaliTUW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/GhaliTU14,
author = {Cesar Ghali and
Gene Tsudik and
Ersin Uzun},
title = {Network-Layer Trust in Named-Data Networking},
journal = {Comput. Commun. Rev.},
volume = {44},
number = {5},
pages = {12--19},
year = {2014},
url = {https://doi.org/10.1145/2677046.2677049},
doi = {10.1145/2677046.2677049},
timestamp = {Sun, 06 Sep 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ccr/GhaliTU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmicn/MahadevanUSG14,
author = {Priya Mahadevan and
Ersin Uzun and
Spencer Sevilla and
J. J. Garcia{-}Luna{-}Aceves},
title = {{CCN-KRS:} a key resolution service for {CCN}},
booktitle = {1st International Conference on Information-Centric Networking, ICN'14,
Paris, France, September 24-26, 2014},
pages = {97--106},
year = {2014},
crossref = {DBLP:conf/acmicn/2014},
url = {https://doi.org/10.1145/2660129.2660154},
doi = {10.1145/2660129.2660154},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/acmicn/MahadevanUSG14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FreudigerRBU14,
author = {Julien Freudiger and
Shantanu Rane and
Alejandro E. Brito and
Ersin Uzun},
title = {Privacy Preserving Data Quality Assessment for High-Fidelity Data
Sharing},
booktitle = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
3, 2014},
pages = {21--29},
year = {2014},
crossref = {DBLP:conf/ccs/2014wiscs},
url = {https://doi.org/10.1145/2663876.2663885},
doi = {10.1145/2663876.2663885},
timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
biburl = {https://dblp.org/rec/conf/ccs/FreudigerRBU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BilogrevicFCU14,
author = {Igor Bilogrevic and
Julien Freudiger and
Emiliano De Cristofaro and
Ersin Uzun},
title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
Part {II}},
pages = {128--145},
year = {2014},
crossref = {DBLP:conf/esorics/2014-2},
url = {https://doi.org/10.1007/978-3-319-11212-1\_8},
doi = {10.1007/978-3-319-11212-1\_8},
timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/esorics/BilogrevicFCU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/RaneU14,
author = {Shantanu Rane and
Ersin Uzun},
title = {A fuzzy commitment approach to privacy preserving behavioral targeting},
booktitle = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
11, 2014},
pages = {31--36},
year = {2014},
crossref = {DBLP:conf/mobicom/2014spme},
url = {https://doi.org/10.1145/2646584.2646591},
doi = {10.1145/2646584.2646591},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mobicom/RaneU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2014spme,
editor = {Ersin Uzun and
Mohamed Ali K{\^{a}}afar},
title = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
11, 2014},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2646584},
doi = {10.1145/2646584},
isbn = {978-1-4503-3075-6},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/mobicom/2014spme.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GhaliTU14,
author = {Cesar Ghali and
Gene Tsudik and
Ersin Uzun},
title = {Elements of Trust in Named-Data Networking},
journal = {CoRR},
volume = {abs/1402.3332},
year = {2014},
url = {http://arxiv.org/abs/1402.3332},
eprinttype = {arXiv},
eprint = {1402.3332},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/GhaliTU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BilogrevicFCU14,
author = {Igor Bilogrevic and
Julien Freudiger and
Emiliano De Cristofaro and
Ersin Uzun},
title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
journal = {CoRR},
volume = {abs/1405.1328},
year = {2014},
url = {http://arxiv.org/abs/1405.1328},
eprinttype = {arXiv},
eprint = {1405.1328},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/BilogrevicFCU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilogrevicFCU14,
author = {Igor Bilogrevic and
Julien Freudiger and
Emiliano De Cristofaro and
Ersin Uzun},
title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {502},
year = {2014},
url = {http://eprint.iacr.org/2014/502},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BilogrevicFCU14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/AbdelberiCKU13,
author = {Chaabane Abdelberi and
Emiliano De Cristofaro and
Mohamed Ali K{\^{a}}afar and
Ersin Uzun},
title = {Privacy in content-oriented networking: threats and countermeasures},
journal = {Comput. Commun. Rev.},
volume = {43},
number = {3},
pages = {25--33},
year = {2013},
url = {https://doi.org/10.1145/2500098.2500102},
doi = {10.1145/2500098.2500102},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ccr/AbdelberiCKU13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KobsaNTU13,
author = {Alfred Kobsa and
Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun},
title = {Can Jannie verify? Usability of display-equipped {RFID} tags for security
purposes},
journal = {J. Comput. Secur.},
volume = {21},
number = {3},
pages = {347--370},
year = {2013},
url = {https://doi.org/10.3233/JCS-130470},
doi = {10.3233/JCS-130470},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/KobsaNTU13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/GastiTU013,
author = {Paolo Gasti and
Gene Tsudik and
Ersin Uzun and
Lixia Zhang},
title = {DoS and DDoS in Named Data Networking},
booktitle = {22nd International Conference on Computer Communication and Networks,
{ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
pages = {1--7},
year = {2013},
crossref = {DBLP:conf/icccn/2013},
url = {https://doi.org/10.1109/ICCCN.2013.6614127},
doi = {10.1109/ICCCN.2013.6614127},
timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
biburl = {https://dblp.org/rec/conf/icccn/GastiTU013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/networking/AfanasyevMMU013,
author = {Alexander Afanasyev and
Priya Mahadevan and
Ilya Moiseenko and
Ersin Uzun and
Lixia Zhang},
title = {Interest flooding attack and countermeasures in Named Data Networking},
booktitle = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24
May, 2013},
pages = {1--9},
year = {2013},
crossref = {DBLP:conf/networking/2013},
url = {https://ieeexplore.ieee.org/document/6663516/},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/networking/AfanasyevMMU013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/JacobsonBDMMBBPSULJBST12,
author = {Van Jacobson and
Rebecca Braynard and
Tim Diebert and
Priya Mahadevan and
Marc Mosko and
Nicholas H. Briggs and
Simon Barber and
Michael F. Plass and
Ignacio Solis and
Ersin Uzun and
Byoung{-}Joon Lee and
Myeong{-}Wuk Jang and
Dojun Byun and
Diana K. Smetters and
James D. Thornton},
title = {Custodian-based information sharing},
journal = {{IEEE} Commun. Mag.},
volume = {50},
number = {7},
pages = {38--43},
year = {2012},
url = {https://doi.org/10.1109/MCOM.2012.6231277},
doi = {10.1109/MCOM.2012.6231277},
timestamp = {Tue, 25 Aug 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cm/JacobsonBDMMBBPSULJBST12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarberBSU12,
author = {Simon Barber and
Xavier Boyen and
Elaine Shi and
Ersin Uzun},
title = {Bitter to Better - How to Make Bitcoin a Better Currency},
booktitle = {Financial Cryptography and Data Security - 16th International Conference,
{FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
Selected Papers},
pages = {399--414},
year = {2012},
crossref = {DBLP:conf/fc/2012},
url = {https://doi.org/10.1007/978-3-642-32946-3\_29},
doi = {10.1007/978-3-642-32946-3\_29},
timestamp = {Tue, 30 Jul 2024 10:38:00 +0200},
biburl = {https://dblp.org/rec/conf/fc/BarberBSU12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/DiBenedettoGTU12,
author = {Steve DiBenedetto and
Paolo Gasti and
Gene Tsudik and
Ersin Uzun},
title = {ANDaNA: Anonymous Named Data Networking Application},
booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
2012, San Diego, California, USA, February 5-8, 2012},
year = {2012},
crossref = {DBLP:conf/ndss/2012},
url = {https://www.ndss-symposium.org/ndss2012/andana-anonymous-named-data-networking-application},
timestamp = {Mon, 01 Feb 2021 08:42:14 +0100},
biburl = {https://dblp.org/rec/conf/ndss/DiBenedettoGTU12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1208-0952,
author = {Paolo Gasti and
Gene Tsudik and
Ersin Uzun and
Lixia Zhang},
title = {DoS and DDoS in Named-Data Networking},
journal = {CoRR},
volume = {abs/1208.0952},
year = {2012},
url = {http://arxiv.org/abs/1208.0952},
eprinttype = {arXiv},
eprint = {1208.0952},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1208-0952.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1211-5183,
author = {Chaabane Abdelberi and
Emiliano De Cristofaro and
Mohamed Ali K{\^{a}}afar and
Ersin Uzun},
title = {Privacy in Content-Oriented Networking: Threats and Countermeasures},
journal = {CoRR},
volume = {abs/1211.5183},
year = {2012},
url = {http://arxiv.org/abs/1211.5183},
eprinttype = {arXiv},
eprint = {1211.5183},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1211-5183.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/NithyanandTU11,
author = {Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun},
title = {User-aided reader revocation in PKI-based {RFID} systems},
journal = {J. Comput. Secur.},
volume = {19},
number = {6},
pages = {1147--1172},
year = {2011},
url = {https://doi.org/10.3233/JCS-2011-0435},
doi = {10.3233/JCS-2011-0435},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcs/NithyanandTU11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/UzunSK11,
author = {Ersin Uzun and
Nitesh Saxena and
Arun Kumar},
title = {Pairing devices for social interactions: a comparative usability evaluation},
booktitle = {Proceedings of the International Conference on Human Factors in Computing
Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
pages = {2315--2324},
year = {2011},
crossref = {DBLP:conf/chi/2011},
url = {https://doi.org/10.1145/1978942.1979282},
doi = {10.1145/1978942.1979282},
timestamp = {Fri, 12 Mar 2021 15:27:48 +0100},
biburl = {https://dblp.org/rec/conf/chi/UzunSK11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KobsaNTU11,
author = {Alfred Kobsa and
Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun},
title = {Usability of Display-Equipped {RFID} Tags for Security Purposes},
booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
pages = {434--451},
year = {2011},
crossref = {DBLP:conf/esorics/2011},
url = {https://doi.org/10.1007/978-3-642-23822-2\_24},
doi = {10.1007/978-3-642-23822-2\_24},
timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/KobsaNTU11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-2205,
author = {Steve DiBenedetto and
Paolo Gasti and
Gene Tsudik and
Ersin Uzun},
title = {ANDaNA: Anonymous Named Data Networking Application},
journal = {CoRR},
volume = {abs/1112.2205},
year = {2011},
url = {http://arxiv.org/abs/1112.2205},
eprinttype = {arXiv},
eprint = {1112.2205},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1112-2205.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NithyanandTU10,
author = {Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun},
title = {Readers Behaving Badly - Reader Revocation in PKI-Based {RFID} Systems},
booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
pages = {19--36},
year = {2010},
crossref = {DBLP:conf/esorics/2010},
url = {https://doi.org/10.1007/978-3-642-15497-3\_2},
doi = {10.1007/978-3-642-15497-3\_2},
timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/NithyanandTU10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/NithyanandSTU10,
author = {Rishab Nithyanand and
Nitesh Saxena and
Gene Tsudik and
Ersin Uzun},
title = {Groupthink: usability of secure group association for wireless devices},
booktitle = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
pages = {331--340},
year = {2010},
crossref = {DBLP:conf/huc/2010},
url = {https://doi.org/10.1145/1864349.1864399},
doi = {10.1145/1864349.1864399},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/huc/NithyanandSTU10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/SorienteTU09,
author = {Claudio Soriente and
Gene Tsudik and
Ersin Uzun},
title = {Secure pairing of interface constrained devices},
journal = {Int. J. Secur. Networks},
volume = {4},
number = {1/2},
pages = {17--26},
year = {2009},
url = {https://doi.org/10.1504/IJSN.2009.023423},
doi = {10.1504/IJSN.2009.023423},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijsn/SorienteTU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/GoodrichSSSTU09,
author = {Michael T. Goodrich and
Michael Sirivianos and
John Solis and
Claudio Soriente and
Gene Tsudik and
Ersin Uzun},
title = {Using audio in secure device pairing},
journal = {Int. J. Secur. Networks},
volume = {4},
number = {1/2},
pages = {57--68},
year = {2009},
url = {https://doi.org/10.1504/IJSN.2009.023426},
doi = {10.1504/IJSN.2009.023426},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijsn/GoodrichSSSTU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/KumarSTU09,
author = {Arun Kumar and
Nitesh Saxena and
Gene Tsudik and
Ersin Uzun},
title = {A comparative study of secure device pairing methods},
journal = {Pervasive Mob. Comput.},
volume = {5},
number = {6},
pages = {734--749},
year = {2009},
url = {https://doi.org/10.1016/j.pmcj.2009.07.008},
doi = {10.1016/J.PMCJ.2009.07.008},
timestamp = {Sat, 22 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/percom/KumarSTU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CagaljSU09,
author = {Mario Cagalj and
Nitesh Saxena and
Ersin Uzun},
title = {On the Usability of Secure Association of Wireless Devices Based on
Distance Bounding},
booktitle = {Cryptology and Network Security, 8th International Conference, {CANS}
2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
pages = {443--462},
year = {2009},
crossref = {DBLP:conf/cans/2009},
url = {https://doi.org/10.1007/978-3-642-10433-6\_30},
doi = {10.1007/978-3-642-10433-6\_30},
timestamp = {Tue, 14 May 2019 10:00:50 +0200},
biburl = {https://dblp.org/rec/conf/cans/CagaljSU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KumarSTU09,
author = {Arun Kumar and
Nitesh Saxena and
Gene Tsudik and
Ersin Uzun},
title = {Caveat Emptor: {A} Comparative Study of Secure Device Pairing Methods},
booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing
and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
pages = {1--10},
year = {2009},
crossref = {DBLP:conf/percom/2009},
url = {https://doi.org/10.1109/PERCOM.2009.4912753},
doi = {10.1109/PERCOM.2009.4912753},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/percom/KumarSTU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/KobsaSTUW09,
author = {Alfred Kobsa and
Rahim Sonawalla and
Gene Tsudik and
Ersin Uzun and
Yang Wang},
title = {Serial hook-ups: a comparative usability study of secure device pairing
methods},
booktitle = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
2009, Mountain View, California, USA, July 15-17, 2009},
year = {2009},
crossref = {DBLP:conf/soups/2009},
url = {https://doi.org/10.1145/1572532.1572546},
doi = {10.1145/1572532.1572546},
timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/soups/KobsaSTUW09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-4743,
author = {Arun Kumar and
Nitesh Saxena and
Ersin Uzun},
title = {Alice Meets Bob: {A} Comparative Usability Study of Wireless Device
Pairing Methods for a "Two-User" Setting},
journal = {CoRR},
volume = {abs/0907.4743},
year = {2009},
url = {http://arxiv.org/abs/0907.4743},
eprinttype = {arXiv},
eprint = {0907.4743},
timestamp = {Thu, 01 Nov 2018 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-0907-4743.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NithyanandTU09,
author = {Rishab Nithyanand and
Gene Tsudik and
Ersin Uzun},
title = {Readers Behaving Badly: Reader Revocation in PKI-Based {RFID} Systems},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {465},
year = {2009},
url = {http://eprint.iacr.org/2009/465},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/NithyanandTU09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/SelcukUP08,
author = {Ali Aydin Sel{\c{c}}uk and
Ersin Uzun and
Mark Resat Pariente},
title = {A Reputation-based Trust Management System for {P2P} Networks},
journal = {Int. J. Netw. Secur.},
volume = {6},
number = {2},
pages = {227--237},
year = {2008},
url = {http://ijns.jalaxy.com.tw/contents/ijns-v6-n2/ijns-2008-v6-n2-p227-237.pdf},
timestamp = {Mon, 04 Jan 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijnsec/SelcukUP08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SorienteTU08,
author = {Claudio Soriente and
Gene Tsudik and
Ersin Uzun},
title = {{HAPADEP:} Human-Assisted Pure Audio Device Pairing},
booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
Taiwan, September 15-18, 2008. Proceedings},
pages = {385--400},
year = {2008},
crossref = {DBLP:conf/isw/2008},
url = {https://doi.org/10.1007/978-3-540-85886-7\_27},
doi = {10.1007/978-3-540-85886-7\_27},
timestamp = {Mon, 05 Feb 2024 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/isw/SorienteTU08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/UzunKA07,
author = {Ersin Uzun and
Kristiina Karvonen and
N. Asokan},
title = {Usability Analysis of Secure Pairing Methods},
booktitle = {Financial Cryptography and Data Security, 11th International Conference,
{FC} 2007, and 1st International Workshop on Usable Security, {USEC}
2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
Selected Papers},
pages = {307--324},
year = {2007},
crossref = {DBLP:conf/fc/2007},
url = {https://doi.org/10.1007/978-3-540-77366-5\_29},
doi = {10.1007/978-3-540-77366-5\_29},
timestamp = {Tue, 14 May 2019 10:00:38 +0200},
biburl = {https://dblp.org/rec/conf/fc/UzunKA07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07,
author = {Claudio Soriente and
Gene Tsudik and
Ersin Uzun},
title = {{HAPADEP:} Human Asisted Pure Audio Device Pairing},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {93},
year = {2007},
url = {http://eprint.iacr.org/2007/093},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SorienteTU07a,
author = {Claudio Soriente and
Gene Tsudik and
Ersin Uzun},
title = {{BEDA:} Button-Enabled Device Pairing},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {246},
year = {2007},
url = {http://eprint.iacr.org/2007/246},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/SorienteTU07a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/GoodrichSSTU06,
author = {Michael T. Goodrich and
Michael Sirivianos and
John Solis and
Gene Tsudik and
Ersin Uzun},
title = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
booktitle = {26th {IEEE} International Conference on Distributed Computing Systems
{(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
pages = {10},
year = {2006},
crossref = {DBLP:conf/icdcs/2006},
url = {https://doi.org/10.1109/ICDCS.2006.52},
doi = {10.1109/ICDCS.2006.52},
timestamp = {Mon, 03 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icdcs/GoodrichSSTU06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoodrichSSTU05,
author = {Michael T. Goodrich and
Michael Sirivianos and
John Solis and
Gene Tsudik and
Ersin Uzun},
title = {Loud and Clear: Human-Verifiable Authentication Based on Audio},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {428},
year = {2005},
url = {http://eprint.iacr.org/2005/428},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/GoodrichSSTU05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/SelcukUP04,
author = {Ali Aydin Sel{\c{c}}uk and
Ersin Uzun and
Mark Resat Pariente},
title = {A reputation-based trust management system for {P2P} networks},
booktitle = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
pages = {251--258},
year = {2004},
crossref = {DBLP:conf/ccgrid/2004},
url = {https://doi.org/10.1109/CCGrid.2004.1336575},
doi = {10.1109/CCGRID.2004.1336575},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccgrid/SelcukUP04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
editor = {Gail{-}Joon Ahn and
Alexander Pretschner and
Gabriel Ghinita},
title = {Proceedings of the Seventh {ACM} Conference on Data and Application
Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
2017},
publisher = {{ACM}},
year = {2017},
url = {http://dl.acm.org/citation.cfm?id=3029806},
isbn = {978-1-4503-4523-1},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/codaspy/2017.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2017,
title = {26th International Conference on Computer Communication and Networks,
{ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017},
publisher = {{IEEE}},
year = {2017},
url = {https://ieeexplore.ieee.org/xpl/conhome/8038296/proceeding},
isbn = {978-1-5090-2991-4},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/icccn/2017.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2017,
title = {2017 {IFIP} Networking Conference, {IFIP} Networking 2017 and Workshops,
Stockholm, Sweden, June 12-16, 2017},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://ieeexplore.ieee.org/xpl/conhome/8253906/proceeding},
isbn = {978-3-901882-94-4},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/networking/2017.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccnc/2016,
title = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
{CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
publisher = {{IEEE}},
year = {2016},
url = {https://ieeexplore.ieee.org/xpl/conhome/7435634/proceeding},
isbn = {978-1-4673-9292-1},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/ccnc/2016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2016,
title = {25th International Conference on Computer Communication and Networks,
{ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
publisher = {{IEEE}},
year = {2016},
url = {https://ieeexplore.ieee.org/xpl/conhome/7566809/proceeding},
isbn = {978-1-5090-2279-3},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/icccn/2016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2015,
editor = {Rahim Kacimi and
Zoubir Mammeri},
title = {Proceedings of the 14th {IFIP} Networking Conference, Networking 2015,
Toulouse, France, 20-22 May, 2015},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://ieeexplore.ieee.org/xpl/conhome/7128766/proceeding},
isbn = {978-3-901882-68-5},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/networking/2015.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wifs/2015,
title = {2015 {IEEE} International Workshop on Information Forensics and Security,
{WIFS} 2015, Roma, Italy, November 16-19, 2015},
publisher = {{IEEE}},
year = {2015},
url = {https://ieeexplore.ieee.org/xpl/conhome/7364553/proceeding},
isbn = {978-1-4673-6802-5},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/wifs/2015.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acmicn/2014,
editor = {Giovanna Carofiglio and
Luca Muscariello and
Lixia Zhang and
Dirk Kutscher},
title = {1st International Conference on Information-Centric Networking, ICN'14,
Paris, France, September 24-26, 2014},
publisher = {{ACM}},
year = {2014},
url = {http://dl.acm.org/citation.cfm?id=2660129},
isbn = {978-1-4503-3206-4},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/acmicn/2014.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014wiscs,
editor = {Gail{-}Joon Ahn and
Tomas Sander},
title = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
3, 2014},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2663876},
doi = {10.1145/2663876},
isbn = {978-1-4503-3151-7},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/ccs/2014wiscs.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
editor = {Miroslaw Kutylowski and
Jaideep Vaidya},
title = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
volume = {8713},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-11212-1},
doi = {10.1007/978-3-319-11212-1},
isbn = {978-3-319-11211-4},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/esorics/2014-2.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2014spme,
editor = {Ersin Uzun and
Mohamed Ali K{\^{a}}afar},
title = {Proceedings of the {ACM} MobiCom Workshop on Security and Privacy
in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September
11, 2014},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2646584},
doi = {10.1145/2646584},
isbn = {978-1-4503-3075-6},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/mobicom/2014spme.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccn/2013,
title = {22nd International Conference on Computer Communication and Networks,
{ICCCN} 2013, Nassau, Bahamas, July 30 - Aug. 2, 2013},
publisher = {{IEEE}},
year = {2013},
url = {https://ieeexplore.ieee.org/xpl/conhome/6603810/proceeding},
isbn = {978-1-4673-5774-6},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/icccn/2013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/networking/2013,
title = {{IFIP} Networking Conference, 2013, Brooklyn, New York, USA, 22-24
May, 2013},
publisher = {{IEEE} Computer Society},
year = {2013},
url = {https://ieeexplore.ieee.org/xpl/conhome/6656124/proceeding},
isbn = {978-3-901882-55-5},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/networking/2013.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2012,
editor = {Angelos D. Keromytis},
title = {Financial Cryptography and Data Security - 16th International Conference,
{FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {7397},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-32946-3},
doi = {10.1007/978-3-642-32946-3},
isbn = {978-3-642-32945-6},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/fc/2012.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2012,
title = {19th Annual Network and Distributed System Security Symposium, {NDSS}
2012, San Diego, California, USA, February 5-8, 2012},
publisher = {The Internet Society},
year = {2012},
url = {https://www.ndss-symposium.org/ndss2012/},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/ndss/2012.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chi/2011,
editor = {Desney S. Tan and
Saleema Amershi and
Bo Begole and
Wendy A. Kellogg and
Manas Tungare},
title = {Proceedings of the International Conference on Human Factors in Computing
Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
publisher = {{ACM}},
year = {2011},
url = {https://doi.org/10.1145/1978942},
doi = {10.1145/1978942},
isbn = {978-1-4503-0228-9},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/chi/2011.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011,
editor = {Vijay Atluri and
Claudia D{\'{\i}}az},
title = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6879},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-23822-2},
doi = {10.1007/978-3-642-23822-2},
isbn = {978-3-642-23821-5},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/esorics/2011.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
editor = {Dimitris Gritzalis and
Bart Preneel and
Marianthi Theoharidou},
title = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6345},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-15497-3},
doi = {10.1007/978-3-642-15497-3},
isbn = {978-3-642-15496-6},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/esorics/2010.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/huc/2010,
editor = {Jakob E. Bardram and
Marc Langheinrich and
Khai N. Truong and
Paddy Nixon},
title = {UbiComp 2010: Ubiquitous Computing, 12th International Conference,
UbiComp 2010, Copenhagen, Denmark, September 26-29, 2010, Proceedings},
series = {{ACM} International Conference Proceeding Series},
publisher = {{ACM}},
year = {2010},
isbn = {978-1-60558-843-8},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/huc/2010.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2009,
editor = {Juan A. Garay and
Atsuko Miyaji and
Akira Otsuka},
title = {Cryptology and Network Security, 8th International Conference, {CANS}
2009, Kanazawa, Japan, December 12-14, 2009. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5888},
publisher = {Springer},
year = {2009},
url = {https://doi.org/10.1007/978-3-642-10433-6},
doi = {10.1007/978-3-642-10433-6},
isbn = {978-3-642-10432-9},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/cans/2009.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2009,
title = {Seventh Annual {IEEE} International Conference on Pervasive Computing
and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}},
publisher = {{IEEE} Computer Society},
year = {2009},
url = {https://ieeexplore.ieee.org/xpl/conhome/4906860/proceeding},
isbn = {978-1-4244-3304-9},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/percom/2009.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soups/2009,
editor = {Lorrie Faith Cranor},
title = {Proceedings of the 5th Symposium on Usable Privacy and Security, {SOUPS}
2009, Mountain View, California, USA, July 15-17, 2009},
series = {{ACM} International Conference Proceeding Series},
publisher = {{ACM}},
year = {2009},
isbn = {978-1-60558-736-3},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/soups/2009.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2008,
editor = {Tzong{-}Chen Wu and
Chin{-}Laung Lei and
Vincent Rijmen and
Der{-}Tsai Lee},
title = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
Taiwan, September 15-18, 2008. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5222},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-85886-7},
doi = {10.1007/978-3-540-85886-7},
isbn = {978-3-540-85884-3},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/isw/2008.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2007,
editor = {Sven Dietrich and
Rachna Dhamija},
title = {Financial Cryptography and Data Security, 11th International Conference,
{FC} 2007, and 1st International Workshop on Usable Security, {USEC}
2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {4886},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-77366-5},
doi = {10.1007/978-3-540-77366-5},
isbn = {978-3-540-77365-8},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/fc/2007.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcs/2006,
title = {26th {IEEE} International Conference on Distributed Computing Systems
{(ICDCS} 2006), 4-7 July 2006, Lisboa, Portugal},
publisher = {{IEEE} Computer Society},
year = {2006},
url = {https://ieeexplore.ieee.org/xpl/conhome/10967/proceeding},
isbn = {0-7695-2540-7},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/icdcs/2006.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccgrid/2004,
title = {4th {IEEE/ACM} International Symposium on Cluster Computing and the
Grid (CCGrid 2004), April 19-22, 2004, Chicago, Illinois, {USA}},
publisher = {{IEEE} Computer Society},
year = {2004},
url = {https://ieeexplore.ieee.org/xpl/conhome/9282/proceeding},
isbn = {0-7803-8430-X},
timestamp = {Sat, 15 Nov 2025 15:35:30 +0100},
biburl = {https://dblp.org/rec/conf/ccgrid/2004.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.