Ronggong Song

According to our database1, Ronggong Song authored at least 39 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
HMS: Holistic MPR selection and network connectivity for tactical edge networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

An architecture for secure interoperability between coalition tactical MANETs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2013
Cross-Layer Security Management Framework for Mobile Tactical Networks.
Proceedings of the 32th IEEE Military Communications Conference, 2013

2012
LAA: Link-layer anonymous access for tactical MANETs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Enhancement of frequency-based wormhole attack detection.
Proceedings of the MILCOM 2011, 2011

2010
Advanced smart card based password authentication protocol.
Comput. Stand. Interfaces, 2010

2009
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
A Scalable Group Key Management Protocol.
IEEE Commun. Lett., 2008

Assessing the Likelihood of Privacy Policy Compliance.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

An Efficient Privacy-Preserving Data Mining Platform.
Proceedings of The 2008 International Conference on Data Mining, 2008

Cooperative Visualization of Privacy Risks.
Proceedings of the Cooperative Design, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

2007
Privacy Rights Management: Implementation Scenarios.
Inf. Resour. Manag. J., 2007

Protect Virtual Property in Online Gaming System.
Int. J. Softw. Eng. Knowl. Eng., 2007

Privacy management system using social networking.
Proceedings of the IEEE International Conference on Systems, 2007

Analysis of Smart Card-Based Remote User Authentication Schemes.
Proceedings of the 2007 International Conference on Security & Management, 2007

Private Data Management in Collaborative Environments.
Proceedings of the Cooperative Design, 2007

Privacy Rights Management for Privacy Compliance Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Ensuring Privacy for Buyer-Seller E-Commerce.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Automated Social Network Analysis for Collaborative Work.
Proceedings of the Cooperative Design, 2006

Towards Designing Secure Online Games.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Ensuring Privacy for E-Health Services.
Proceedings of the The First International Conference on Availability, 2006

2005
Distributed device networks with security constraints.
IEEE Trans. Ind. Informatics, 2005

An analysis of online gaming crime characteristics.
Internet Res., 2005

AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Online Gaming Cheating and Security Issue.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Protection of Virtual Property in Online Gaming.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Agent-based Transactions for Home Energy Services.
Proceedings of the 11th International Conference on Distributed Multimedia Systems, 2005

Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering.
Proceedings of the Cooperative Design, 2005

2004
Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan.
Proceedings of the Second Annual Conference on Privacy, 2004

Scalability, Security Technologies and Mobile Applications.
Proceedings of the Mobility Aware Technologies and Applications, 2004

How to Make E-cash with Non-Repudiation and Anonymity.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Scalability of Agent-Based Onion Routing Network.
Proceedings of the 19th International Conference on Computers and Their Applications, 2004

2003
Pay-TV system with strong privacy and non-repudiation protection.
IEEE Trans. Consumer Electron., 2003

Cryptanalysis of scalable multicast security protocol.
IEEE Commun. Lett., 2003

Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
Anonymous Communications for Mobile Agents.
Proceedings of the Mobile Agents for Telecommunication Applications, 2002

Anonymous Internet Communication Based on IPSec.
Proceedings of the Communication Systems: The State of the Art, IFIP 17<sup>th</sup> World Computer Congress, 2002

2001
Analysis of privacy and non-repudiation on pay-TV systems.
IEEE Trans. Consumer Electron., 2001


  Loading...