Research Interest and Experience
- Network Security
- Wireless Sensor Networks
- Formal Methods
- Parallel Computing for multi-core systems
- Location Privacy
I like to keep theory and practice in balance.
Degrees
Degree | Period | Program | University | Country |
---|---|---|---|---|
Lic | 2011-2016 | Computer Science with specialization in Computer Communication | Uppsala University | Sweden |
MSc | 2009-2011 | Computer Science | Uppsala University | Sweden |
BSc | 2004-2009 | Computer Science and Engineering | Sabanci University | Turkey |
Supervision
Year | Thesis Level | Student |
---|---|---|
2014 | BSc | Aleksander Okonski |
Teaching
Period | Year | Course |
---|---|---|
Spring | 2016 | Computer Networks III |
Spring | 2016 | Distributed Information Systems |
Spring | 2016 | Operating Systems I |
Fall | 2015 | Wireless communication and networked embedded systems |
Spring | 2015 | Distributed Information Systems |
Fall | 2014 | Wireless communication and networked embedded systems |
Fall | 2014 | Computer Networks I |
Spring | 2014 | Computer Networks I |
Fall | 2013 | Distributed Information Systems |
Fall | 2013 | Computer Networks I |
Spring | 2013 | Computer Networks III |
Spring | 2013 | Wireless communication and networked embedded systems |
Fall | 2012 | Computer Networks I |
Spring | 2012 | Computer Networks I |
Fall | 2011 | Computer Networks I |
Publications
- Protocol, mobility and adversary models for the verification of security. Licentiate thesis, IT licentiate theses / Uppsala University, Department of Information Technology nr 2016-007, Uppsala University, 2016. (fulltext).
- Modelling and analysing a WSN secure aggregation protocol: A comparison of languages and tool support. Technical report / Department of Information Technology, Uppsala University nr 2015-033, 2015. (External link).
- Computer science students’ perception of computer network security. In Proc. 1st International Conference on Learning and Teaching in Computing and Engineering, pp 204-207, IEEE Computer Society, Los Alamitos, CA, 2013. (DOI, fulltext:postprint).
- Towards adaptive zero-knowledge protocols: A case study with Fiat–Shamir identification protocol. In Proc. 9th Swedish National Computer Networking Workshop, pp 67-70, 2013.
- The impact of trace and adversary models on location privacy provided by K-anonymity. In Proc. 1st Workshop on Measurement, Privacy, and Mobility, ACM Press, New York, 2012. (DOI).