CSC 774 Network Security

Presentations for the Advanced Topics

Guidelines for preparing for the presentation (TB Posted).

Grading policy for presentations (TB Posted).

You can get most of the papers by searching in our library or citeseer.

You can choose any paper if it hasn't been assigned. Requests are accommodated in the order in which they are received. If you don't decide by March 3, the instructor will assign a paper to you.

You need to send your presentation slides in pdf to the instructor by Friday in the week prior to your presentation.

Topic Area
Date
Paper
Presenter
Slides
Group Key Distribution
1
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," in Proceedings of ACM SIGCOMM 97, pages 277 -- 288.
Vladica Stanisic
2
H. Harney and E. Harder, "Logical Key Hierarchy Protocol," Internet Draft, draft-harney-sparta-lkhp-sec-00.txt, 1999.
Yiquan Hu
3
I. Chang and R. Engel and D. Kandlur and D. Pendarakis and D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques," in Proceedings of IEEE Infocomm'99", pages 689--698, 1999.
Dingbang Xu
4
R. Safavi-Naini and H. Wang, "New Constructions of Secure Multicast Re-Keying Schemes using Perfect Hash Families," in Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 228--234, 2000.
5
B. Briscoe, "MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences," in Proceedings of 1st International Workshop on Networked Group Communication, 1999.
6
R. Kumar and S. Rajagopalan and A. Sahai, "Coding Constructions for Blacklisting Problems without Computational Assumptions," in Advances in Cryptology -- Crypto '99, LNCS 1666, pages 609--623, 1999.
Donggang Liu
7
S. Banerjee and B. Bhattacharjee, Scalable Secure Group Communication over IP Mulitcast," in Proceedings of Internation Conference on Network Protocols, November, 2001.
Kun Sun
Group Key Agreement
8
M. Steiner and G. Tsudik and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," in Proceedings of the 3rd ACM Conference on Computer and Communications Security, pages 31--37, 1996.
Qingfeng He
9
G. Ateniese and M. Steiner and G. Tsudik, "Authenticated Group Key Agreement and Friends," in Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17 -- 26, 1998.
10
Y. Kim and A. Perrig and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 235 -- 244, 2000.
Anubhav Dhoot
11
D. Balenson and D. McGrew and A. Sherman, "Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization," Internet Draft, draft-balenson-groupkeymgmt-oft-00.txt, February, 2000.
Broadcast Authentication
12
Adrian Perrig and Ran Canetti and Dawn Song and Doug Tygar, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," in Proc. of IEEE Security and Privacy Symposium, May 2000.
Pooja Kohli
13
Adrian Perrig and Ran Canetti and Dawn Song and Doug Tygar, "Efficient and Secure Source Authentication for Multicast," in Proceedings of Network and Distributed System Security Symposium, February, 2001.
Nikhil Negandhi
14
Adrian Perrig, "The BiBa One-Time Signature and Broadcast Authentication Protocol," in Proceedings of the ACM Conference on Computer and Communications Security, November, 2001.
Rich Larsen
15
Leonid Reyzin and Natan Reyzin, "Better than BiBa: Short One-time Signatures with Fast Signing and Verifying," in Proceedings of 7th Australasian Conference on Information Security and Privacy, LNCS ????, 2002.
Amit Singh Gambhir
Wireless Security
16
  J. Hubaux and L. Buttyan and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001.
Hua Li
 
17
S. Marti and T. J. Giuli and K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255 -- 265, 2000.
Monty Barber
18
D. Balfanz and D.K. Smetters and P. Stewart and H.C. Wong, "Talking to Strangers: Authentication in Ad-Hoc Wireless Networks," in Proceedings of 2002 Symposium on Network and Distributed Systems Security (NDSS '02), February 2002.
Erkang Zheng
19
Y. Hu and A. Perrig and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad~Hoc Networks," inProceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), September, 2002.
Sameer Korrapati
20     S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc Networks)," in Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 226--236, June, 2002.

Bharathy Sethumadhavan
 
21     S. Zhu, S. Xu, S. Setia and S. Jajodia."LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks," To appear in ICDCS 2003 International Workshop on Mobile and Wireless Network (MWN 2003), May 2003.
Pan Wang
 
22     L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41 -- 47, November, 2002.
Stratimir Doichev
 
23     Adrian Perrig and Robert Szewczyk and Victor Wen and David Culler and J.D. Tygar, "SPINS: Security Protocols for Sensor Networks," in Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001.
Sujeet Mehta