Derrick Kong

According to our database1, Derrick Kong authored at least 8 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Event-based Data Model for Granular Information Flow Tracking.
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020

2017
Realizing a virtual private network using named data networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2015
Template for a Certification Practice Statement (CPS) for the Resource PKI (RPKI).
RFC, April, 2015

2012
Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI).
RFC, February, 2012

A Profile for Route Origin Authorizations (ROAs).
RFC, February, 2012

A secure content network in space.
Proceedings of the seventh ACM international workshop on Challenged networks, 2012

2009
An architecture for scalable network defense.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

2004
TinyPK: securing sensor networks with public key technology.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004


  Loading...