1. R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in Proceedings of ACM SIGMOD (2003), pp. 86–97
2. E. Al-Shaer, H. Hamed, Discovery of policy anomalies in distributed firewalls, in Proceedings of IEEE INFOCOM (2004), pp. 2605–2616
3. J. Brickell, V. Shmatikov, Privacy-preserving graph algorithms in the semi-honest model, in Proceedings of ASIACRYPT (2010), pp. 236–252
4. Y.-K. Chang, Fast binary and multiway prefix searches for packet forwarding. Comput. Netw. 51(3), 588–605 (2007)
5. J. Cheng, H. Yang, S.H. Wong, S. Lu, Design and implementation of cross-domain cooperative firewall, in Proceedings of IEEE ICNP (2007)