BibTeX records: Cuicui Su

download as .bib file

@article{DBLP:journals/tc/WangSSMLD20,
  author       = {Yongzhi Wang and
                  Yulong Shen and
                  Cuicui Su and
                  Jiawen Ma and
                  Lingtong Liu and
                  Xuewen Dong},
  title        = {CryptSQLite: SQLite With High Data Security},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {5},
  pages        = {666--678},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2019.2963303},
  doi          = {10.1109/TC.2019.2963303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WangSSMLD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangSSCYFL19,
  author       = {Yongzhi Wang and
                  Yulong Shen and
                  Cuicui Su and
                  Ke Cheng and
                  Yibo Yang and
                  Anter Faree and
                  Yao Liu},
  title        = {CFHider: Control Flow Obfuscation with Intel {SGX}},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {541--549},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737444},
  doi          = {10.1109/INFOCOM.2019.8737444},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/WangSSCYFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ChengSWWMJS19,
  author       = {Ke Cheng and
                  Yulong Shen and
                  Yongzhi Wang and
                  Liangmin Wang and
                  Jianfeng Ma and
                  Xionghong Jiang and
                  Cuicui Su},
  title        = {Strongly Secure and Efficient Range Queries in Cloud Databases under
                  Multiple Keys},
  booktitle    = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019,
                  Paris, France, April 29 - May 2, 2019},
  pages        = {2494--2502},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFOCOM.2019.8737593},
  doi          = {10.1109/INFOCOM.2019.8737593},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ChengSWWMJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WangSCYSF18,
  author       = {Yongzhi Wang and
                  Yulong Shen and
                  Ke Cheng and
                  Yibo Yang and
                  Cuicui Su and
                  Anter Faree},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {Obfuscating program control flow with Intel {SGX}},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering:
                  Companion Proceeedings, {ICSE} 2018, Gothenburg, Sweden, May 27 -
                  June 03, 2018},
  pages        = {321--322},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183440.3194990},
  doi          = {10.1145/3183440.3194990},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/WangSCYSF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/SuWSCM17,
  author       = {Cuicui Su and
                  Yongzhi Wang and
                  Yulong Shen and
                  Ke Cheng and
                  Jiawen Ma},
  title        = {Improving Database Storage Usability with the Cloud-Based Architecture},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {494--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.102},
  doi          = {10.1109/DSC.2017.102},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/SuWSCM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nana/WangLSMWYSLZD17,
  author       = {Yongzhi Wang and
                  Lingtong Liu and
                  Cuicui Su and
                  Jiawen Ma and
                  Lei Wang and
                  Yibo Yang and
                  Yulong Shen and
                  Guangxia Li and
                  Tao Zhang and
                  Xuewen Dong},
  title        = {CryptSQLite: Protecting Data Confidentiality of SQLite with Intel
                  {SGX}},
  booktitle    = {International Conference on Networking and Network Applications, NaNA
                  2017, Kathmandu City, Nepal, October 16-19, 2017},
  pages        = {303--308},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/NaNA.2017.48},
  doi          = {10.1109/NANA.2017.48},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nana/WangLSMWYSLZD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics