BibTeX records: Huayi Duan

download as .bib file

@article{DBLP:journals/tdsc/DuanDZWAW23,
  author       = {Huayi Duan and
                  Yuefeng Du and
                  Leqian Zheng and
                  Cong Wang and
                  Man Ho Au and
                  Qian Wang},
  title        = {Towards Practical Auditing of Dynamic Data in Decentralized Storage},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {708--723},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3142611},
  doi          = {10.1109/TDSC.2022.3142611},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuanDZWAW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengWWDN23,
  author       = {Yifeng Zheng and
                  Cong Wang and
                  Ruochen Wang and
                  Huayi Duan and
                  Surya Nepal},
  title        = {Optimizing Secure Decision Tree Inference Outsourcing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3079--3092},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3194048},
  doi          = {10.1109/TDSC.2022.3194048},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengWWDN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuDXCWW23,
  author       = {Yuefeng Du and
                  Huayi Duan and
                  Lei Xu and
                  Helei Cui and
                  Cong Wang and
                  Qian Wang},
  title        = {{\textdollar}\{\{{\textbackslash}sf PEBA\}\}{\textdollar}: Enhancing
                  User Privacy and Coverage of Safe Browsing Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {4343--4358},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3204767},
  doi          = {10.1109/TDSC.2022.3204767},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuDXCWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/StogerZDP23,
  author       = {Felix St{\"{o}}ger and
                  Anxin Zhou and
                  Huayi Duan and
                  Adrian Perrig},
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Demystifying Web3 Centralization: The Case of Off-Chain {NFT} Hijacking},
  booktitle    = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47751-5\_11},
  doi          = {10.1007/978-3-031-47751-5\_11},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/StogerZDP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/DuanFL0BP23,
  author       = {Huayi Duan and
                  Rub{\'{e}}n Fischer and
                  Jie Lou and
                  Si Liu and
                  David A. Basin and
                  Adrian Perrig},
  editor       = {Mahesh Balakrishnan and
                  Manya Ghobadi},
  title        = {{RHINE:} Robust and High-performance Internet Naming with {E2E} Authenticity},
  booktitle    = {20th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2023, Boston, MA, April 17-19, 2023},
  pages        = {531--553},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/nsdi23/presentation/duan},
  timestamp    = {Thu, 11 May 2023 17:08:22 +0200},
  biburl       = {https://dblp.org/rec/conf/nsdi/DuanFL0BP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/0003DHBVBP23,
  author       = {Si Liu and
                  Huayi Duan and
                  Lukas Heimes and
                  Marco Bearzi and
                  Jodok Vieli and
                  David A. Basin and
                  Adrian Perrig},
  editor       = {Henning Schulzrinne and
                  Vishal Misra and
                  Eddie Kohler and
                  David A. Maltz},
  title        = {A Formal Framework for End-to-End {DNS} Resolution},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2023 Conference, {ACM} {SIGCOMM}
                  2023, New York, NY, USA, 10-14 September 2023},
  pages        = {932--949},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3603269.3604870},
  doi          = {10.1145/3603269.3604870},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/0003DHBVBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDWWN22,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Cong Wang and
                  Ruochen Wang and
                  Surya Nepal},
  title        = {Securely and Efficiently Outsourcing Decision Tree Inference},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1841--1855},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3040012},
  doi          = {10.1109/TDSC.2020.3040012},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengDWWN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DuDZWAW22,
  author       = {Yuefeng Du and
                  Huayi Duan and
                  Anxin Zhou and
                  Cong Wang and
                  Man Ho Au and
                  Qian Wang},
  title        = {Enabling Secure and Efficient Decentralized Storage Auditing With
                  Blockchain},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3038--3054},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3081826},
  doi          = {10.1109/TDSC.2021.3081826},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DuDZWAW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0019ZD00J22,
  author       = {Lei Xu and
                  Anxin Zhou and
                  Huayi Duan and
                  Cong Wang and
                  Qian Wang and
                  Xiaohua Jia},
  title        = {Toward Full Accounting for Leakage Exploitation and Mitigation in
                  Dynamic Encrypted Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/894},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0019ZD00J22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDTWZ21,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Xiaoting Tang and
                  Cong Wang and
                  Jiantao Zhou},
  title        = {Denoising in the Dark: Privacy-Preserving Deep Neural Network-Based
                  Image Denoising},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1261--1275},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2907081},
  doi          = {10.1109/TDSC.2019.2907081},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengDTWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuDZYW21,
  author       = {Lei Xu and
                  Huayi Duan and
                  Anxin Zhou and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Interpreting and Mitigating Leakage-Abuse Attacks in Searchable Symmetric
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {5310--5325},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3128823},
  doi          = {10.1109/TIFS.2021.3128823},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuDZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-00397,
  author       = {Yifeng Zheng and
                  Cong Wang and
                  Ruochen Wang and
                  Huayi Duan and
                  Surya Nepal},
  title        = {Optimizing Secure Decision Tree Inference Outsourcing},
  journal      = {CoRR},
  volume       = {abs/2111.00397},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.00397},
  eprinttype    = {arXiv},
  eprint       = {2111.00397},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-00397.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuDZYW21,
  author       = {Lei Xu and
                  Huayi Duan and
                  Anxin Zhou and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Interpreting and Mitigating Leakage-abuse Attacks in Searchable Symmetric
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1593},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1593},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/XuDZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhengDY020,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {121--133},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2753245},
  doi          = {10.1109/TDSC.2017.2753245},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhengDY020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/0001DZ0AW20,
  author       = {Yuefeng Du and
                  Huayi Duan and
                  Anxin Zhou and
                  Cong Wang and
                  Man Ho Au and
                  Qian Wang},
  title        = {Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized
                  Storage},
  booktitle    = {40th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2020, Singapore, November 29 - December 1, 2020},
  pages        = {201--211},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDCS47774.2020.00023},
  doi          = {10.1109/ICDCS47774.2020.00023},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/0001DZ0AW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05531,
  author       = {Yuefeng Du and
                  Huayi Duan and
                  Anxin Zhou and
                  Cong Wang and
                  Man Ho Au and
                  Qian Wang},
  title        = {Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized
                  Storage},
  journal      = {CoRR},
  volume       = {abs/2005.05531},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05531},
  eprinttype    = {arXiv},
  eprint       = {2005.05531},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05531.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DuanZWY19,
  author       = {Huayi Duan and
                  Yifeng Zheng and
                  Cong Wang and
                  Xingliang Yuan},
  title        = {Treasure Collection on Foggy Islands: Building Secure Network Archives
                  for Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {2637--2650},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2872461},
  doi          = {10.1109/JIOT.2018.2872461},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DuanZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuanWYZW019,
  author       = {Huayi Duan and
                  Cong Wang and
                  Xingliang Yuan and
                  Yajin Zhou and
                  Qian Wang and
                  Kui Ren},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {LightBox: Full-stack Protected Stateful Middlebox at Lightning Speed},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2351--2367},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3339814},
  doi          = {10.1145/3319535.3339814},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DuanWYZW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhengDW19,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Cong Wang},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards Secure and Efficient Outsourcing of Machine Learning Classification},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {22--40},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_2},
  doi          = {10.1007/978-3-030-29959-0\_2},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhengDW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CuiDQWZ19,
  author       = {Helei Cui and
                  Huayi Duan and
                  Zhan Qin and
                  Cong Wang and
                  Yajin Zhou},
  title        = {{SPEED:} Accelerating Enclave Applications Via Secure Deduplication},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1072--1082},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00110},
  doi          = {10.1109/ICDCS.2019.00110},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CuiDQWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangDWLW19,
  author       = {Xiaoli Zhang and
                  Huayi Duan and
                  Cong Wang and
                  Qi Li and
                  Jianping Wu},
  title        = {Towards Verifiable Performance Measurement over In-the-Cloud Middleboxes},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {1162--1170},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737435},
  doi          = {10.1109/INFOCOM.2019.8737435},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangDWLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LuoJDWXF19,
  author       = {Yuchuan Luo and
                  Xiaohua Jia and
                  Huayi Duan and
                  Cong Wang and
                  Ming Xu and
                  Shaojing Fu},
  title        = {pRide: private ride request for online ride hailing service with secure
                  hardware enclave},
  booktitle    = {Proceedings of the International Symposium on Quality of Service,
                  IWQoS 2019, Phoenix, AZ, USA, June 24-25, 2019},
  pages        = {27:1--27:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3326285.3329062},
  doi          = {10.1145/3326285.3329062},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/LuoJDWXF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DuanZDZWA19,
  author       = {Huayi Duan and
                  Yifeng Zheng and
                  Yuefeng Du and
                  Anxin Zhou and
                  Cong Wang and
                  Man Ho Au},
  title        = {Aggregating Crowd Wisdom via Blockchain: {A} Private, Correct, and
                  Robust Realization},
  booktitle    = {2019 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom, Kyoto, Japan, March 11-15, 2019},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PERCOM.2019.8767412},
  doi          = {10.1109/PERCOM.2019.8767412},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/DuanZDZWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengDW18,
  author       = {Yifeng Zheng and
                  Huayi Duan and
                  Cong Wang},
  title        = {Learning the Truth Privately and Confidently: Encrypted Confidence-Aware
                  Truth Discovery in Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {10},
  pages        = {2475--2489},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819134},
  doi          = {10.1109/TIFS.2018.2819134},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChenWLCMLDWQ18,
  author       = {Fei Chen and
                  Donghong Wang and
                  Ronghua Li and
                  Jianyong Chen and
                  Zhong Ming and
                  Alex X. Liu and
                  Huayi Duan and
                  Cong Wang and
                  Jing Qin},
  title        = {Secure Hashing-Based Verifiable Pattern Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2677--2690},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2825141},
  doi          = {10.1109/TIFS.2018.2825141},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChenWLCMLDWQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/YuanDW18,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Assuring String Pattern Matching in Outsourced Middleboxes},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {26},
  number       = {3},
  pages        = {1362--1375},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2822837},
  doi          = {10.1109/TNET.2018.2822837},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/YuanDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/CaiDW18,
  author       = {Chengjun Cai and
                  Huayi Duan and
                  Cong Wang},
  title        = {Tutorial: Building Secure and Trustworthy Blockchain Applications},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {120--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00023},
  doi          = {10.1109/SECDEV.2018.00023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/CaiDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DuanYW17,
  author       = {Huayi Duan and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {LightBox: SGX-assisted Secure Network Functions at Near-native Speed},
  journal      = {CoRR},
  volume       = {abs/1706.06261},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.06261},
  eprinttype    = {arXiv},
  eprint       = {1706.06261},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DuanYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/YuanDW16,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Bringing execution assurances of pattern matching in outsourced middleboxes},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784424},
  doi          = {10.1109/ICNP.2016.7784424},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/YuanDW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/YuanDW16a,
  author       = {Xingliang Yuan and
                  Huayi Duan and
                  Cong Wang},
  title        = {Towards verifiable outsourced middleboxes},
  booktitle    = {24th {IEEE} International Conference on Network Protocols, {ICNP}
                  2016, Singapore, November 8-11, 2016},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICNP.2016.7784466},
  doi          = {10.1109/ICNP.2016.7784466},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/YuanDW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics