Paper list

1. Shamir Secret Sharing

Reference: How to share a secret, A. Shamir - Communications of the ACM, 1979 

[1a] URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, Haiyun Luo,  Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, IEEE/ACM Transactions on Networking, 2004

[1b] Prio: Private, Robust, and Scalable Computation of Aggregate Statistics, Henry Corrigan-Gibbs and Dan Boneh, in NSDI 2017. 

2. Key agreement

[2a] Tree-based group key agreement, Yongdae Kim, Adrian Perrig, Gene Tsudik, in ACM Transactions on Information and System Security, 2004

[2b] Instant and Robust Authentication and Key Agreement among Mobile Devices, Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao, in ACM CCS, 2016. 

3. Digital Signatures

[3a] Digital Signatures for Flows and Multicasts, Chung Kei Wong and Simon S. Lam,  IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999

[3b] An IoT Data Communication Framework for Authenticity and Integrity, Xin Li, Huazhe Wang, Ye Yu, and Chen Qian, In Proc of ACM/IEEE IoTDI 2017

4. Group key management

[4a] ``Secure Group Communications using Key Graphs,'' Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, Proceedings of ACM SIGCOMM '98

[4b] Self-healing key distribution with revocation, J. Staddon ; S. Miner ; M. Franklin ; D. Balfanz ; M. Malkin ; D. Dean, IEEE S&P, 2002. 

5. Verifiable Computing

[5a] Verifying computations with state, Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish, in SOSP 2013

[5b] Verifiable Auctions for Online Ad Exchanges, Sebastian Angel and Michael Walfish, in SIGCOMM 2013. 

6. Attribute-based encryption

[6a] Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, in IEEE TPDS 2012. 

[6b] Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, Wenhai Sun ;  Shucheng Yu ;  Wenjing Lou ;  Y. Thomas Hou ;  Hui Li, in INFOCOM 2014.

6. Content sharing

[6c] Scalable and private media consumption with Popcorn, Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish, in NSDI 2016. 

7. Internet security

[7a] High-Speed Inter-domain Fault Localization, Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, and Adrian Perrig, in IEEE S&P, 2016.

8. Cloud security

[8b] Splinter: Practical Private Queries on Public Data, Frank Wang, Catherine Yun, Shafi Goldwasser, and Vinod Vaikuntanathan,  Matei Zaharia, in NSDI 2017. 

9. WiFi security

[9a] Intercepting Mobile Communications: The Insecurity of 802.11, Nikita Borisov, Ian Goldberg, and David A. Wagner, MOBICOM, July 2001

[9b] Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks, Yu-Chih Tung, Sihui Han, Dongyao Chen, and Kang G. Shin, in CCS 2014. 

10. RFID security

[10a] GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags, Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao, IEEE /ACM Transactions on Networking (ToN), 2016 

11. IoT security

[11a] Resilient End-to-End Message Protection for Cyber-Physical System Communications, Y.-J. Kim, V. Kolesnikov, and M. Thottan, in IEEE Transactions on Smart Grid, 2016

[11b] SANA: Secure and Scalable Aggregate Network Attestation, Moreno Ambrosin Mauro Conti Ahmad Ibrahim Gregory Neven Ahmad-Reza Sadeghi Matthias Schunter, in CCS, 2016

[11c] Security Analysis of Emerging Smart Home Applications, Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, in IEEE S&P, 2016.

[11d] ViewMap: Sharing Private In-Vehicle Dashcam Videos, Minho Kim, Jaemin Lim, Hyunwoo Yu, Kiyeon Kim, Younghoon Kim, and Suk-Bok Lee, in USENIX NSDI, 2017

12. Augmented Reality and 3D printing

[12a] No Escape From Reality: Security and Privacy of Augmented Reality Browsers, Richard McPherson, Suman Jana, Vitaly Shmatikov, in WWW 2015. 

[12b] My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers, Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu, in CCS 2016. 

AttachmentSize
PDF icon GroupKey-b.pdf543.88 KB
PDF icon Verifiable-a.pdf533.75 KB
PDF icon Verifiable-b.pdf393.38 KB
PDF icon ABE-b.pdf415.77 KB
PDF icon CPS-b.pdf980.75 KB