Research Interests mathematical and applied cryptography, security protocols, privacy techniques, arithmetic on elliptic and hyperelliptic curves, pairing-based cryptographic schemes

Journal and Conference Publications

privacy techniques, security protocols & security system design

  1. Privacy Preserving Policy-Based Content Sharing in Public Clouds. Mohamed Nabeel, Ning Shang, and Elisa Bertino. In IEEE Transactions on Knowledge and Data Engineering, 25(11):2602-2614, October 2013. 
  2. A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model. Omar Hasan, Lionel Brunie, Elisa Bertino, and Ning Shang. In IEEE Transactions on Information Forensics and Security, 8(6):949-962, May 2013.
  3. Efficient Privacy Preserving Content Based Publish Subscribe Systems. Mohamed Nabeel, Ning Shang, and Elisa Bertino. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT'12), Newark, NJ, USA, June 20-22, 2012: 133-144.
  4. A Privacy-Preserving Approach to Policy-Based Content Dissemination. Ning Shang, Mohamed Nabeel, Federica Paci, and Elisa Bertino. In Proceedings of 26th IEEE International Conference on Data Engineering, March 1-6, 2010. Long Beach, California, USA: 944-955.
  5. Privacy-Preserving Matching of Spatial Datasets with Protection against Background Knowledge. Gabriel Ghinita, Carmen Ruiz Vicente, Ning Shang, Elisa Bertino. The 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS 2010), November 2-5, 2010, San Jose, California.
  6. Efficient and Privacy-Preserving Enforcement of Attribute-Based Access Control. Ning Shang, Federica Paci, and Elisa Bertino. The 9th Symposium on Identity and Trust on the Internet (IDTrust Symposiums), NIST, Gaithersburg, MD, April 13-15, 2010: 63-68.
  7. Privacy-Preserving Management of Transaction's Receipts for Mobile Environments. Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, and Elisa Bertino. In Proceedings of the 8th Symposium on Identity and Trust on the Internet (IDTrust Symposiums), NIST, Gaithersburg, MD, April 14-16, 2009.
  8. Digital Identity Protection -- Concepts and Issues. Elisa Bertino, Federica Paci, and Ning Shang. Invited paper. In Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES), Fukuoka, Japan, March 16-19, 2009.
  9. Privacy-Preserving Digital Identity Management for Cloud Computing. Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang. Invited paper. In the Bulletin of the IEEE Computer Society Technical Committee on Data Engineering.
  10. An Efficient Time-bound Hierarchical Key Management Scheme for Secure Broadcasting. Elisa Bertino, Ning Shang, Samuel S. Wagstaff, Jr. IEEE Transactions on Dependable and Secure Computing 5(2): 65-70 (2008).

Mathematical and theoretical cryptography

  1. Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields. Kristin Lauter and Ning Shang, Designs, Codes and Cryptography, June 2013, Volume 67, Issue 3, pp 341–355.
  2. Controlling Data Disclosures in Computational PIR Protocols (short paper) . Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino. The 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010), April 13-16, 2010, Beijing, China: 310-313.
  3. Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. Stefan Erickson, Michael J. Jacobson, Jr., Ning Shang, Shuo Shen, and Andreas Stein. WAIFI 2007 (Madrid, Spain), volume 4547 of LNCS, 2007, pp.202-218.

Demo papers

  1. Mask: A System for Privacy-Preserving Policy-Based Access to Published Content. Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino. ACM SIGMOD International Conference on Management of Data, Indianapolis, June 6-11, 2010.
  2. VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, and Elisa Bertino. Demo paper. Tenth International Conference on Mobile Data Management 2009, Taipei, Taiwan, 18-20 May 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3650-7.
  3. Presentations

Program Committees

Reviewers