Jing Dong

According to our database1, Jing Dong authored at least 15 papers between 2008 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2013
On the practicality of cryptographic defences against pollution attacks in wireless network coding.
ACM Comput. Surv., 2013

2012
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Sec. Comput., 2012

2011
Secure Routing in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Group Communication in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Wireless Mesh Networks (General Overview).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Practical defenses against pollution attacks in wireless network coding.
ACM Trans. Inf. Syst. Secur., 2011

2010
Secure and robust virtual coordinate system in wireless sensor networks.
TOSN, 2010

Tradeoffs between security and communication performance in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

2009
Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Computer Communications, 2009

Secure group communication in wireless mesh networks.
Ad Hoc Networks, 2009

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Secure group communication in wireless mesh networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Mitigating attacks against virtual coordinate based routing in wireless sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008


  Loading...