dblp.uni-trier.dewww.dagstuhl.dewww.uni-trier.de

Jiejun Kong (Selection)

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo


26Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla: Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. IACR Cryptology ePrint Archive 2011: 639 (2011)
25Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhen Cao, Jiejun Kong, Mario Gerla, Zhong Chen, Jian-bin Hu: Filtering false data via authentic consensus in vehicle ad hoc networks. IJAACS 3(2): 217-235 (2010)
24no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLZhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu: A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact. ITSL 2008: 23-28
23Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLYunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Park: CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast. Computer Communications 31(15): 3672-3682 (2008)
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLWeichao Wang, Jiejun Kong, Bharat K. Bhargava, Mario Gerla: Visualisation of wormholes in underwater sensor networks: a distributed approach. IJSN 3(1): 10-23 (2008)
21Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Xiaoyan Hong, Dapeng Wu, Mario Gerla: Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks. BIBE 2007: 914-921
20Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLEugenio Magistretti, Jiejun Kong, Uichin Lee, Mario Gerla, Paolo Bellavista, Antonio Corradi: A Mobile Delay-Tolerant Approach to Long-Term Energy-Efficient Underwater Sensor Networking. WCNC 2007: 2866-2871
19Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLUichin Lee, Jiejun Kong, Mario Gerla, Joon-Sang Park, Eugenio Magistretti: Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods. Ad Hoc Networks 5(6): 943-958 (2007)
18Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Xiaoyan Hong, Mario Gerla: An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 6(8): 888-902 (2007)
17Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLUichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio Magistretti, Mario Gerla: Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods. ISCC 2006: 609-615
16Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Xiaoyan Hong, Mario Gerla: Modeling Ad-hoc rushing attack in a negligibility-based security framework. Workshop on Wireless Security 2006: 55-64
14Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJun-Hong Cui, Jiejun Kong, Mario Gerla, Shengli Zhou: The challenges of building mobile underwater wireless networks for aquatic applications. IEEE Network 20(3): 12-18 (2006)
13Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLXiaoyan Hong, Jiejun Kong, Mario Gerla: Mobility changes anonymity: new passive threats in mobile ad hoc networks. Wireless Communications and Mobile Computing 6: 281-293 (2006)
12Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla: Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. ISCC 2005: 57-62
11Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, Mario Gerla: A secure ad-hoc routing approach using localized self-healing communities. MobiHoc 2005: 254-265
10Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla: Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. SASN 2005: 97-106
9Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Zhengrong Ji, Weichao Wang, Mario Gerla, Rajive Bagrodia, Bharat K. Bhargava: Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. Workshop on Wireless Security 2005: 87-96
4Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla: ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. Workshop on Wireless Security 2003: 51-60
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, Songwu Lu: Adaptive security for multilevel ad hoc networks. Wireless Communications and Mobile Computing 2(5): 533-547 (2002)

Selection of 19 from 26 records - Jiejun Kong has 30 coauthors

Last update 2012-09-10 CET by the DBLP TeamThis material is Open Data Content released under the ODC-BY 1.0 license — See also our legal information page