1. Shamir Secret Sharing
Reference: How to share a secret, A. Shamir - Communications of the ACM, 1979
[1a] URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks, Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, IEEE/ACM Transactions on Networking, 2004
[1b] Prio: Private, Robust, and Scalable Computation of Aggregate Statistics, Henry Corrigan-Gibbs and Dan Boneh, in NSDI 2017.
2. Key agreement
[2b] Instant and Robust Authentication and Key Agreement among Mobile Devices, Wei Xi, Chen Qian, Jinsong Han, Kun Zhao, Sheng Zhong, Xiang-Yang Li, Jizhong Zhao, in ACM CCS, 2016.
3. Digital Signatures
[3a] Digital Signatures for Flows and Multicasts, Chung Kei Wong and Simon S. Lam, IEEE/ACM Transactions on Networking, Vol. 7, No. 4, August 1999
[3b] An IoT Data Communication Framework for Authenticity and Integrity, Xin Li, Huazhe Wang, Ye Yu, and Chen Qian, In Proc of ACM/IEEE IoTDI 2017
4. Group key management
[4a] ``Secure Group Communications using Key Graphs,'' Chung Kei Wong, Mohamed Gouda, and Simon S. Lam, Proceedings of ACM SIGCOMM '98
[4b] Self-healing key distribution with revocation, J. Staddon ; S. Miner ; M. Franklin ; D. Balfanz ; M. Malkin ; D. Dean, IEEE S&P, 2002.
5. Verifiable Computing
[5a] Verifying computations with state, Benjamin Braun, Ariel J. Feldman, Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish, in SOSP 2013
[5b] Verifiable Auctions for Online Ad Exchanges, Sebastian Angel and Michael Walfish, in SIGCOMM 2013.
6. Attribute-based encryption
[6a] Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-based Encryption, Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, in IEEE TPDS 2012.
[6b] Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud, Wenhai Sun ; Shucheng Yu ; Wenjing Lou ; Y. Thomas Hou ; Hui Li, in INFOCOM 2014.
6. Content sharing
[6c] Scalable and private media consumption with Popcorn, Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, Michael Walfish, in NSDI 2016.
7. Internet security
[7a] High-Speed Inter-domain Fault Localization, Cristina Basescu, Yue-Hsun Lin, Haoming Zhang, and Adrian Perrig, in IEEE S&P, 2016.
8. Cloud security
[8b] Splinter: Practical Private Queries on Public Data, Frank Wang, Catherine Yun, Shafi Goldwasser, and Vinod Vaikuntanathan, Matei Zaharia, in NSDI 2017.
9. WiFi security
[9a] Intercepting Mobile Communications: The Insecurity of 802.11, Nikita Borisov, Ian Goldberg, and David A. Wagner, MOBICOM, July 2001
[9b] Vulnerability and Protection of Channel State Information in Multiuser MIMO Networks, Yu-Chih Tung, Sihui Han, Dongyao Chen, and Kang G. Shin, in CCS 2014.
10. RFID security
[10a] GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags, Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao, IEEE /ACM Transactions on Networking (ToN), 2016
11. IoT security
[11a] Resilient End-to-End Message Protection for Cyber-Physical System Communications, Y.-J. Kim, V. Kolesnikov, and M. Thottan, in IEEE Transactions on Smart Grid, 2016
[11b] SANA: Secure and Scalable Aggregate Network Attestation, Moreno Ambrosin Mauro Conti Ahmad Ibrahim Gregory Neven Ahmad-Reza Sadeghi Matthias Schunter, in CCS, 2016
[11c] Security Analysis of Emerging Smart Home Applications, Earlence Fernandes, Jaeyeon Jung, and Atul Prakash, in IEEE S&P, 2016.
[11d] ViewMap: Sharing Private In-Vehicle Dashcam Videos, Minho Kim, Jaemin Lim, Hyunwoo Yu, Kiyeon Kim, Younghoon Kim, and Suk-Bok Lee, in USENIX NSDI, 2017
12. Augmented Reality and 3D printing
[12a] No Escape From Reality: Security and Privacy of Augmented Reality Browsers, Richard McPherson, Suman Jana, Vitaly Shmatikov, in WWW 2015.
[12b] My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers, Chen Song, Feng Lin, Zhongjie Ba, Kui Ren, Chi Zhou, Wenyao Xu, in CCS 2016.