Research Interests
mathematical and applied cryptography, security protocols, privacy techniques,
arithmetic on elliptic and hyperelliptic curves, pairing-based cryptographic
schemes
Journal and Conference Publications
privacy techniques, security protocols & security system design
-
Privacy Preserving Policy-Based Content Sharing in Public Clouds.
Mohamed Nabeel, Ning Shang, and Elisa Bertino. In IEEE Transactions
on Knowledge and Data Engineering, 25(11):2602-2614, October 2013.
-
A Decentralized Privacy Preserving Reputation Protocol for the Malicious
Adversarial Model.
Omar Hasan, Lionel Brunie, Elisa Bertino, and Ning Shang. In
IEEE Transactions on Information Forensics and Security, 8(6):949-962,
May 2013.
-
Efficient Privacy Preserving Content Based Publish Subscribe Systems.
Mohamed Nabeel, Ning Shang, and Elisa Bertino. In Proceedings of
the 17th ACM Symposium on Access Control Models and Technologies
(SACMAT'12), Newark, NJ, USA, June 20-22, 2012: 133-144.
-
A Privacy-Preserving Approach to Policy-Based Content Dissemination.
Ning Shang, Mohamed Nabeel, Federica Paci, and Elisa Bertino. In
Proceedings of 26th IEEE International Conference on Data Engineering, March
1-6, 2010. Long Beach, California, USA: 944-955.
-
Privacy-Preserving Matching of Spatial Datasets with Protection against
Background Knowledge.
Gabriel Ghinita, Carmen Ruiz Vicente, Ning Shang, Elisa Bertino.
The 18th ACM SIGSPATIAL International Conference on Advances in Geographic
Information Systems (ACM SIGSPATIAL GIS 2010), November 2-5, 2010, San
Jose, California.
-
Efficient and Privacy-Preserving Enforcement of Attribute-Based Access Control.
Ning Shang, Federica Paci, and Elisa Bertino. The 9th
Symposium on
Identity and Trust on the Internet (IDTrust Symposiums), NIST,
Gaithersburg, MD, April 13-15, 2010: 63-68.
-
Privacy-Preserving Management of Transaction's Receipts for Mobile
Environments.
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, and
Elisa Bertino. In Proceedings of the 8th Symposium on Identity and Trust on
the Internet (IDTrust Symposiums), NIST, Gaithersburg, MD, April 14-16, 2009.
-
Digital Identity Protection -- Concepts and Issues.
Elisa Bertino, Federica Paci, and Ning Shang.
Invited paper. In Proceedings of the Fourth International Conference on
Availability, Reliability and Security (ARES), Fukuoka, Japan, March 16-19,
2009.
-
Privacy-Preserving Digital Identity Management for Cloud Computing.
Elisa Bertino, Federica Paci, Rodolfo Ferrini, Ning Shang. Invited paper.
In the Bulletin of the IEEE Computer Society Technical Committee on
Data Engineering.
-
An Efficient Time-bound Hierarchical Key Management Scheme for Secure
Broadcasting. Elisa Bertino, Ning Shang, Samuel S. Wagstaff, Jr.
IEEE Transactions on Dependable and Secure Computing 5(2): 65-70 (2008).
Mathematical and theoretical cryptography
-
Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields.
Kristin Lauter and Ning Shang, Designs, Codes and Cryptography,
June 2013, Volume 67, Issue 3, pp 341–355.
-
Controlling Data Disclosures in Computational PIR Protocols (short paper)
.
Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino. The 5th
ACM Symposium on Information, Computer and Communication Security (ASIACCS
2010), April 13-16, 2010, Beijing, China: 310-313.
-
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. Stefan Erickson, Michael J. Jacobson, Jr., Ning Shang, Shuo Shen, and Andreas Stein. WAIFI 2007 (Madrid, Spain), volume 4547 of LNCS, 2007, pp.202-218.
Demo papers
-
Mask: A System for Privacy-Preserving Policy-Based Access to Published
Content. Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino.
ACM SIGMOD International Conference on Management of Data,
Indianapolis, June 6-11, 2010.
-
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile
Devices.
Federica Paci, Ning Shang, Kevin Steuer Jr., Ruchith Fernando, and
Elisa Bertino. Demo paper. Tenth International Conference on Mobile Data
Management 2009, Taipei, Taiwan, 18-20 May 2009. IEEE Computer Society 2009,
ISBN 978-0-7695-3650-7.
Presentations
-
Montgomery's Ladder: Side-channel attacks and defenses on elliptic curve scalar multiplication
Slides (Web)
-
Efficient and Privacy-Preserving Enforcement of Attribute-Based Access Control.
April 13-15, 2010. The 9th Symposium on Identity and Trust on the Internet
(IDTrust Symposiums). NIST, Gaithersburg, Maryland, USA.
Slides (PDF)
-
Privacy-Preserving Management of Transactions' Receipts for Mobile Environments.
April 14-16, 2009. The 8th Symposium on Identity and Trust on the Internet
(IDtrust 2009). NIST, Gaithersburg, Maryland, USA.
Slides (PDF)
-
The Oblivious Commitment-Based Envelope Protocols:
Concerning Crypto, Communications and Digital Identity Management.
January 23, 2009. TheceriasR Research Seminar, Purdue University.
Slides (PDF)
-
More Research Directions on Digital Identity Management.
October 21, 2008.
CS 591C - Research Seminar for First-Year Graduate Students, Purdue University.
Slides (PDF)
-
An Introduction to Elliptic Curve Cryptography.
September 26, 2008. The ceriasR Research Seminar, Purdue Universty.
Slides (PDF)
-
An Efficient Time-bound Hierarchical Key Management Scheme for Secure
Broadcasting.
2008 San Diego Joint Mathematics Meetings.
Slides (PDF)
Program Committees
-
NSS 2012, the 6th International Conference on Network and System Security.
Wu Yi Shan, Fujian, China, November 21-23, 2012.
-
ACM CODASPY 2012: Second ACM Conference on Data and Application Security
and Privacy. San Antonio, TX, USA, February 7-9, 2012.
-
ACM CODASPY 2011: First ACM Conference on Data and Application Security
and Privacy. San Antonio, TX, USA, February 21-23, 2011.
-
VLDB 2010, 36th International Conference on Very Large Data Bases.
Singapore, September 13-17, 2010.
Reviewers
-
IEEE Transactions on Information Forensics and Security
-
Journal of Systems and Software
-
IEEE Internet Computing
-
Computer Standards and Interfaces
-
IEEE Transaction on Knowledge and Data Engineering
-
IEEE Transactions on Dependable and Secure Computing
-
IEEE Transactions on Parallel and Distributed Systems (TPDS)
-
IEEE Transactions on Broadcasting Special Issue: IPTV in Multimedia
Broadcasting
-
The 2007 IEEE International Conference on Information Reuse and Integration
-
IEEE International Computer Software and Applications Conference (COMPSAC)
2009
-
ACM Symposium on Access Control Models and Technologies (SACMAT) 2009
-
Sub-reviewer, The IEEE International Conference on Data Engineering (ICDE
2011)
-
Sub-reviewer, The International Conference on Risks and Security of
Internet and Systems 2009 (CRiSIS 2009)
-
Sub-reviewer, The 2009 IEEE International Conference on Information
Privacy, Security, Risk and Trust (PASSAT-09)
-
Sub-reviewer, ACM Symposium on Information, Computer and Communications
Security (ASIACCS 2009)
-
Sub-reviewer, The second International Conference on Pairing-based
Cryptography (Pairing 2008)
-
Sub-reviewer, International Conference on Information Security and
Cryptology, 2007
-
Sub-reviewer, 2006 International Conference on Information and
Communications Security (ICICS'06)