Selected Publications

 
Home
Publications
  TESLA
  APG
  SED
  Déjà Vu
   
TESLA project
Projects
Photos
Links
 

Network security projects

Sensor Network Security

Authentication and signature of broadcast streams

Key distribution and agreement of dynamic groups

DDoS Attacks Defense

Secure Routing Protocols


Automatic Security Protocol Generation and Verification

  • A First Step towards the Automatic Generation of Security Protocols PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of Network and Distributed System Security NDSS 2000, February 2000.
  • Looking for diamonds in the desert: Automatic security protocol generation for three-party authentication and key distribution PS, PS.GZ, PDF, HTML, BIB, with Dawn Song. In Proc. of IEEE Computer Security Foundations Workshop CSFW 13, July 2000.
  • AGVI --- Automatic Generation, Verification, and Implementation of Security ProtocolsPS, PS.GZ, PDF, HTML, BIB, with Dawn Song and Doantam Phan. In Proceedings of 13th Conference on Computer Aided Verification CAV 2001, July 2001.

Applied Cryptography

Search on Encrypted Data

  • The BiBa One-Time Signature and Broadcast Authentication Protocol PS, PDF, PS.GZ, HTML, BIB, in Proceedings of the ACM Conference on Computer and Communications Security CCS 2001, November 2001.
  • Practical Techniques for Searches on Encrypted Data PS, PS.GZ, PDF, HTML, BIB, with Dawn Song and David Wagner. In Proc. of IEEE Security and Privacy Symposium S&P2000, May 2000.

Human Factors in Computer Security

Hash Visualization and User Authentication through Image Recognition