DHT:
[1] I. Stoica, et al., Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, ACM SIGCOMM, 2001.
Data center networks:
[2] M. Al-Fares, et al., A Scalable, Commodity Data Center Network Architecture, ACM SIGCOMM, 2008.
Software defined networking:
[3] M. Al-Fares, et al., Hedera: Dynamic Flow Scheduling for Data Center Networks, USENIX NSDI, 2010.
Cloud:
[4] Improving the scalability of data center networks with traffic-aware virtual machine placement. X. Meng, V. Pappas, and L. Zhang. In Proc. of IEEE INFOCOM, 2010.
Wireless routing
[5] Karp and Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless Networks, in Proc. of ACM Mobicom 2000.
[7] Ben Leong, Barbara Liskov, and Robert Morris, Geographic Routing without Planarization, in NSDI 2006.
Network security
[8] Intercepting Mobile Communications: The Insecurity of 802.11 Nikita Borisov, Ian Goldberg, David Wagner, in Proc. of ACM Mobicom 2001.
[9] Chung Kei Wong, Mohamed G. Gouda, and Simon S. Lam, Secure Group Communications Using Key Graphs, IEEE/ACM Transactions on Networking, Vol. 8, No. 1, Feb. 2000
RFID systems
[10] Jinsong Han, Chen Qian, Panlong Yang, Dan Ma, Zhiping Jiang, Wei Xi, Jizhong Zhao, GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags, IEEE /ACM Transactions on Networking (ToN), 2016
[11] Echoscope: Verifiable Smart Packaging with Passive RFID, in Proc of ACM Ubicomp 2016.
IoT security:
[12] Instant and Robust Authentication and Key Agreement among Mobile Devices, in Proc of ACM CCS 2016.
[13] Saiyu Qi, Yuanqing Zheng, Mo Li, Yunhao Liu, Jinli Qiu, Scalable Data Access Control in RFID-Enabled Supply Chain. in Proc of IEEE ICNP 2014
Network topology
[14] Jellyfish: Networking Data Centers Randomly, Ankit Singla, Chi-Yao Hong , Lucian Popa , P. Brighten Godfrey, in NSDI 2012
[15] Ye Yu and Chen Qian, Space Shuffle: A Scalable, Flexible, and High-Bandwidth Data Center Network, in Proceedings of 21th IEEE International Conference on Network Protocols (ICNP), 2014.
Virtual coordinates
[16] Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris, Vivaldi: A Decentralized Network Coordinate System, in SIGCOMM, 2004.
Delaunay triangulation
[6] Lam and Qian, "Geographic Routing in d-dimensional Spaces with Guaranteed Delivery and Low Stretch," in Proceedings of ACM SIGMETRICS, 2011.
[17] Qian and Lam, "ROME: Routing On Metropolitan-scale Ethernet". in Proceedings of 20th IEEE International Conference on Network Protocols (ICNP), 2012.
Erasure coding
[18] Luigi Rizzo, Effective Erasure Codes for Reliable Computer Communication Protocols, ACM SIGCOMM Computer Communication Review, April 1997. ( pdf )
[19] Y. Ma, et al., An Ensemble of Replication and Erasure Codes for Cloud File Systems, IEEE INFOCOMM 2013.
Network coding
[20] S. Gollakota and D. Katabi, ZigZag Decoding: Combating Hidden Terminals in Wireless Networks, in SIGCOMM 2008.
Bloom Filter
[21] Andrei Broder and Michael Mitzenmacher, Network Applications of Bloom Filters: A Survey, in Internet Mathematics, 2005.
Hashing
[22] Dong Zhou, Bin Fan, Hyeontaek Lim, Michael Kaminsky, David G. Andersen, Scalable, High Performance Ethernet Forwarding with CUCKOOSWITCH, in ACM CoNEXT, 2013
[23] Ye Yu, Djamal Belazzougui, Chen Qian, and Qin Zhang Memory-efficient and Ultra-fast Network Lookup and Forwarding using Othello Hashing, in IEEE ICNP, 2017
Bitcoin
[24] Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System