Jiejun Kong

According to our database1, Jiejun Kong authored at least 35 papers between 2001 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2015
RVIP: an indistinguishable approach to scalable network simulation at real time.
Wireless Communications and Mobile Computing, 2015

2012
RVIP: bridging live networks and software virtual networks for large scale network simulation at real time.
Proceedings of the 15th ACM International Conference on Modeling, 2012

2011
Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks.
IACR Cryptology ePrint Archive, 2011

2010
Filtering false data via authentic consensus in vehicle ad hoc networks.
IJAACS, 2010

2009
Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes.
IEEE Trans. Vehicular Technology, 2009

2008
Visualisation of wormholes in underwater sensor networks: a distributed approach.
IJSN, 2008

CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast.
Computer Communications, 2008

A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact.
Proceedings of the 2008 International Conference on Information Theory and Statistical Learning, 2008

2007
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods.
Ad Hoc Networks, 2007

A Mobile Delay-Tolerant Approach to Long-Term Energy-Efficient Underwater Sensor Networking.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks.
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007

2006
Mobility changes anonymity: new passive threats in mobile ad hoc networks.
Wireless Communications and Mobile Computing, 2006

The challenges of building mobile underwater wireless networks for aquatic applications.
IEEE Network, 2006

GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks.
IACR Cryptology ePrint Archive, 2006

Modeling Ad-hoc rushing attack in a negligibility-based security framework.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

Performance evaluation of anonymous routing protocols in MANETs.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Distributed multicast group security architecture for mobile ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.
Proceedings of IEEE International Conference on Communications, 2006

2005
Formal Notions of Anonymity for Peer-to-peer Networks.
IACR Cryptology ePrint Archive, 2005

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

A secure ad-hoc routing approach using localized self-healing communities.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Ad Hoc Network Security.
Proceedings of the Mobile Computing Handbook., 2004

URSA: ubiquitous and robust access control for mobile ad hoc networks.
IEEE/ACM Trans. Netw., 2004

2003
ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Design and Implementation of a Temporal Extension of SQL.
Proceedings of the 19th International Conference on Data Engineering, 2003

Random flow network modeling and simulations for DDoS attack mitigation.
Proceedings of IEEE International Conference on Communications, 2003

2002
Adaptive security for multilevel ad hoc networks.
Wireless Communications and Mobile Computing, 2002

Self-securing ad hoc wireless networks.
Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 2002

A security architecture for application session handoff.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks.
Proceedings of the 9th International Conference on Network Protocols (ICNP 2001), 2001


  Loading...