scispace - formally typeset
D

Deli Gong

Researcher at National University of Singapore

Publications -  5
Citations -  30

Deli Gong is an academic researcher from National University of Singapore. The author has contributed to research in topics: Verifiable secret sharing & Internet exchange point. The author has an hindex of 3, co-authored 5 publications receiving 20 citations.

Papers
More filters
Proceedings ArticleDOI

Practical Verifiable In-network Filtering for DDoS Defense

TL;DR: In this article, the authors proposed a verifiable in-network filtering system, called VIF, that exploits emerging hardware-based trusted execution environments (TEEs) and offers filtering verifiability to DDoS victims and neighboring networks.
Posted Content

Practical Verifiable In-network Filtering for DDoS defense

TL;DR: This paper proposes a verifiable in-network filtering system, called VIF, that exploits emerging hardware-based trusted execution environments (TEEs) and offers filtering verifiability to DDoS victims and neighboring networks and suggests that Internet exchange points are the good candidates to be early adopters of the authors' verifiable filters.
Proceedings ArticleDOI

Robust P2P Primitives Using SGX Enclaves

TL;DR: This work studies the setting of a synchronous network wherein peer nodes have CPUs equipped with a recent trusted computing mechanism called Intel SGX, and observes that the byzantine adversary reduces to the adversary in the general-omission model.
Journal Article

Practical Verifiable In-network Filtering for DDoS defense

TL;DR: In Proceedings of IEEE International Conference on Distributed Computing Systems (IEEE ICDCS), 2019 as discussed by the authors, the authors present a paper on distributed computing systems for the first time.
Journal Article

Robust Synchronous P2P Primitives Using SGX Enclaves.

TL;DR: This work studies the setting of a synchronous network wherein peer nodes have CPUs equipped with a recent trusted computing mechanism called Intel SGX, and observes that the byzantine adversary reduces to the adversary in the general-omission model.