Seminar Computer Networks and Telematics, SoSe 2024
News
- 17.04.2024-22.04.2024: If you want to participate, submit your choice of topics to the forum of ILIAS
Dates
- 1st meeting, 18.04.2024, 16-18 (room 051-00-006), presentation of the topics, organization
- 17.04.2024-22.04.2024: submit 3 topics of your choice to the forum of ILIAS
- 22.07.2024, 09-17, block seminar day 1 (room 051-00-006)
- 23.07.2024, 09-17, block seminar day 2 (room 051-00-006)
Contents
We discuss up-to-date topics of distributed algorithms, cryptography, localization and wireless communication. Topics appear here soon.
- Localization
-
Shuai Huang, and Ivan Dokmanić. "Reconstructing point sets from distance distributions." IEEE Transactions on Signal Processing 69 (2021): 1811-1827. (JB)
-
Kreković, Miranda, Ivan Dokmanić, and Martin Vetterli. "Shapes from echoes: uniqueness from point-to-plane distance matrices." IEEE Transactions on Signal Processing 68 (2020): 2480-2498. (JB)
-
Palmér, Tobias, Giuseppe Bianco, Mikael T. Ekvall, Lars-Anders Hansson, and Kalle Åström. "Calibration, positioning and tracking in a refractive and reflective scene." In 2016 23rd international conference on pattern recognition (ICPR), pp. 3810-3815. IEEE, 2016. (JB)
- Plinge, A., Fink, G.A. and Gannot, S., 2017. Passive online geometry calibration of acoustic sensor networks. IEEE Signal Processing Letters, 24(3), pp.324-328.(CS)
- Dokmanić, I., Parhizkar, R., Walther, A., Lu, Y.M. and Vetterli, M., 2013. Acoustic echoes reveal room shape. Proceedings of the National Academy of Sciences, 110(30), pp.12186-12191. (CS)
-
- Cryptography
- Blum, M., 1983. Coin flipping by telephone a protocol for solving impossible problems. ACM SIGACT News, 15(1), pp.23-27. (CS)
- Goldreich, O., Micali, S. and Wigderson, A., 1986, October. Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986) (pp. 174-187). IEEE. (CS)
- Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P. and Maxwell, G., 2018, May. Bulletproofs: Short proofs for confidential transactions and more. In 2018 IEEE symposium on security and privacy (SP) (pp. 315-334). IEEE. (CS)
- Hoffmann, M., Klooß, M. and Rupp, A., 2019, November. Efficient zero-knowledge arguments in the discrete log setting, revisited. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2093-2110). (CS)
- Nejatollahi, H., Dutt, N., Ray, S., Regazzoni, F., Banerjee, I. and Cammarota, R., 2019. Post-quantum lattice-based cryptography implementations: A survey. ACM Computing Surveys (CSUR), 51(6), pp.1-41. (CS)
- Aranha, D.F., Baum, C., Gjøsteen, K., Silde, T. and Tunge, T., 2021, May. Lattice-based proof of shuffle and applications to electronic voting. In Cryptographers’ Track at the RSA Conference (pp. 227-251). Cham: Springer International Publishing. (CS)
- Goldreich, O. and Oren, Y., 1994. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, 7(1), pp.1-32. (CS)
- Morais, E., Koens, T., Van Wijk, C. and Koren, A., 2019. A survey on zero knowledge range proofs and applications. SN Applied Sciences, 1, pp.1-17. (CS)
- Wan, G., Johnson, A., Wails, R., Wagh, S. and Mittal, P., 2019. Guard placement attacks on path selection algorithms for Tor. Proceedings on Privacy Enhancing Technologies, 2019(4). (CS)
- Fruhwirth, C., 2005. New methods in hard disk encryption. (CS)
- Ronald L. Rivest, Adi Shamir, and Yael Tauman. 2001. How to Leak a Secret. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT '01). Springer-Verlag, Berlin, Heidelberg, 552–565.
- Visual Cryptography
- Naor, M. and Shamir, A., 1995. Visual cryptography. In Advances in Cryptology—EUROCRYPT'94: Workshop on the Theory and Application of Cryptographic Techniques Perugia, Italy, May 9–12, 1994 Proceedings 13 (pp. 1-12). Springer Berlin Heidelberg. (CS)
- Aronov, B., Davis, A.R., Dey, T.K., Pal, S.P. and Prasad, D.C., 1995, September. Visibility with reflection. In Proceedings of the eleventh annual symposium on Computational geometry (pp. 316-325). (SM)
- Liu, Z., Zhang, Z. and Fang, H., 2023. Approximating complex 3D curves using origami spring structures. Communications Engineering, 2(1), p.90. (SM)
- Aronov, B., Davis, A.R., Dey, T.K., Pal, S.P. and Prasad, D.C., 1998. Visibility with multiple reflections. Discrete & Computational Geometry, 20, pp.61-78. (SM)
- Aronov, B., Guibas, L.J., Teichmann, M. and Zhang, L., 1998, December. Visibility queries in simple polygons and applications. In International Symposium on Algorithms and Computation (pp. 358-367). Berlin, Heidelberg: Springer Berlin Heidelberg. (CS)
- MIMO and Near-Field
- Halldórsson, M.M., 2013, September. Modeling reality algorithmically: the case of wireless communication. In International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (pp. 1-5). Berlin, Heidelberg: Springer Berlin Heidelberg. (CS)
- Chuah, C.N., Tse, D.N.C., Kahn, J.M. and Valenzuela, R.A., 2002. Capacity scaling in MIMO wireless systems under correlated fading. IEEE Transactions on Information theory, 48(3), pp.637-650. (CS)
- McKay, M.R., Collings, I.B. and Tulino, A.M., 2009. Achievable sum rate of MIMO MMSE receivers: A general analytic framework. IEEE Transactions on Information Theory, 56(1), pp.396-410. (CS)
- N. Garcia, H. Wymeersch, E. G. Larsson, A. M. Haimovich and M. Coulon, "Direct Localization for Massive MIMO," in IEEE Transactions on Signal Processing, vol. 65, no. 10, pp. 2475-2487, 15 May15, 2017, doi: 10.1109/TSP.2017.2666779. (CS)
- Ros, F.J., Martinez, J.A. and Ruiz, P.M., 2014. A survey on modeling and simulation of vehicular networks: Communications, mobility, and tools. Computer Communications, 43, pp.1-15. (CS)
- Peer-to-Peer Networks
-
Giakkoupis, G., Sauerwald, T., Stauffer, A. (2014). Randomized Rumor Spreading in Dynamic Graphs. In: Esparza, J., Fraigniaud, P., Husfeldt, T., Koutsoupias, E. (eds) Automata, Languages, and Programming. ICALP 2014. Lecture Notes in Computer Science, vol 8573. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43951-7_42. (SN)
-
Giustina, D. D., Londero, C., Piazza, C., Riccardi, B., Romanello, R.: Quantum encoding of dynamic directed graphs. Journal of Logical and Algebraic Methods in Programming, vol. 136, (2024). https://doi.org/10.1016/j.jlamp. (SN)
-
Lau, L. C., Tung, K. C., Wang, R.: Cheeger Inequalities for Directed Graphs and Hypergraphs using Reweighted Eigenvalues. In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC 2023), pp. 1834–1847. Association for Computing Machinery, New York, NY, USA (2023). https://doi.org/10.1145/3564246.3585139 (SN)
-
Dinitz, Y., Dolev, S. & Kumar, M. Local Deal-Agreement Algorithms for Load Balancing in Dynamic General Graphs. Theory Comput Syst 67, 348–382 (2023). https://doi.org/10.1007/s00224-022-10097-6 (SN)
- Sauerwald, T. and Sun, H., 2012, October. Tight bounds for randomized load balancing on arbitrary network topologies. In 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (pp. 341-350). IEEE. (CS)
- Zhang, Y. and Bojja Venkatakrishnan, S., 2023, May. Kadabra: adapting Kademlia for the decentralized web. In International Conference on Financial Cryptography and Data Security (pp. 327-345). Cham: Springer Nature Switzerland. (CS)
- Donenfeld, J.A., 2017, February. WireGuard: Next Generation Kernel Network Tunnel. In NDSS (pp. 1-12).
- Wan, G., Johnson, A., Wails, R., Wagh, S. and Mittal, P., 2019. Guard placement attacks on path selection algorithms for Tor. Proceedings on Privacy Enhancing Technologies, 2019(4).
-
Supervisors
- CS: Christian Schindelhauer (schindel at tf dot uni dash freiburg dot de)
- JB: Joan Bordoy (bordoy at informatik dot uni dash freiburg dot de)
- SM: Sneha Mohanty (mohanty at informatik dot uni dash freiburg dot de)
- SN: Saptadi Nugroho (saptadinugroho at gmail dot com)
Deliverables
For a successful participation you have to
- Write a written 2-5 pages report (LaTeX) and upload it using ILIAS until 10.07.2023 (1/4)
- Give a 30 minute final presentation during the block seminar (upload slides to ILIAS) (1/2)
- Survive the 15 minute discussion after your presentation (1/4)
Presentations may be recorded. Attendance to all final presentations is mandatory.