The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Li Gong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Li Gong
    Is Cross-Platform Security Possible? [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:402- [Conf]
  2. Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers
    User Authentication and Authorization in the Java(tm) Platform. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:285-290 [Conf]
  3. Li Gong
    Lower Bounds on Messages and Rounds for Network Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:26-37 [Conf]
  4. Li Gong
    New Protocols for Third-Party-Based Authentication and Secure Broadcast. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:176-183 [Conf]
  5. Li Gong, Jennifer Lai
    Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude. [Citation Graph (0, 0)][DBLP]
    CHI, 2001, pp:158-165 [Conf]
  6. Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong
    Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:219-226 [Conf]
  7. Li Gong
    Handling Infeasible Specifications fo Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:99-102 [Conf]
  8. Li Gong
    A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:131-136 [Conf]
  9. Li Gong
    Optimal authentication protocols resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:24-29 [Conf]
  10. Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell
    Panel Introduction: The Security Impact of Distributed Computing Technologies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:164-166 [Conf]
  11. Li Gong
    Developing Security Systems in the Real World. [Citation Graph (0, 0)][DBLP]
    ECOOP, 2000, pp:251- [Conf]
  12. John A. Bull, Li Gong, Karen R. Sollins
    Towards Security in an Open Systems Federation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:3-20 [Conf]
  13. Li Gong, Satya Dodda
    Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:89-0 [Conf]
  14. Dirk Balfanz, Li Gong
    Experience with Secure Multi-Processing in Java. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:398-405 [Conf]
  15. Li Gong
    Securely Replicating Authentication Services. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1989, pp:85-93 [Conf]
  16. Li Gong
    Verifiable-Text Attacks in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1990, pp:686-693 [Conf]
  17. Li Gong
    Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust. [Citation Graph (0, 0)][DBLP]
    INTERACT, 2003, pp:- [Conf]
  18. Li Gong, Roland Schemers
    Signing, Sealing, and Guarding Java Objects. [Citation Graph (0, 0)][DBLP]
    Mobile Agents and Security, 1998, pp:206-216 [Conf]
  19. Li Gong, Roland Schemers
    Implementing Protection Domains in the JavaTM Development Kit 1.2. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  20. T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham
    Reducing Risks from Poorly Chosen Keys. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:14-18 [Conf]
  21. Simon N. Foley, Li Gong, Xiaolei Qian
    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf]
  22. Li Gong
    A Secure Identity-Based Capability System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:56-65 [Conf]
  23. Li Gong, Roger M. Needham, Raphael Yahalom
    Reasoning about Belief in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:234-248 [Conf]
  24. Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong
    Secure Software Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:84-93 [Conf]
  25. Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox
    Ensuring Assurance in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:114-118 [Conf]
  26. Li Gong, Marianne Mueller, Hemma Prafullchandra, Roland Schemers
    Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. [Citation Graph (0, 0)][DBLP]
    USENIX Symposium on Internet Technologies and Systems, 1997, pp:- [Conf]
  27. Clifford Nass, Li Gong
    Speech interfaces from an evolutionary perspective. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:9, pp:36-43 [Journal]
  28. Michael K. Reiter, Li Gong
    Securing Causal Relationships in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1995, v:38, n:8, pp:633-642 [Journal]
  29. Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap
    Guest Editors' Introduction: Securing the High-Speed Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:6, pp:33-35 [Journal]
  30. Li Gong
    Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1995, v:9, n:3, pp:131-145 [Journal]
  31. Li Gong
    Tutorial: Peer to Peer Networks in Action. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2002, v:3, n:1, pp:- [Journal]
  32. Li Gong
    Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents. [Citation Graph (0, 0)][DBLP]
    International Journal of Man-Machine Studies, 2007, v:65, n:3, pp:183-191 [Journal]
  33. Li Gong
    A Software Architecture for Open Service Gateways. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:1, pp:64-0 [Journal]
  34. Li Gong
    Industry Report: JXTA: A Network Programming Environment. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2001, v:5, n:3, pp:88-0 [Journal]
  35. Li Gong
    Guest Editor's Introduction: Peer-to-Peer Networks in Action. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:1, pp:37-39 [Journal]
  36. Li Gong
    A New Column for a New Year. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:1, pp:96- [Journal]
  37. Li Gong
    Why Cross-Platform Security. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2003, v:7, n:3, pp:95-96 [Journal]
  38. Li Gong
    It's China(town). [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:5, pp:103-104 [Journal]
  39. Li Gong
    Secure Java Class Loading. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:6, pp:56-61 [Journal]
  40. Li Gong, Ravi S. Sandhu
    Guest Editors' Introduction: What Makes Security Technologies Relevant? [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:6, pp:38-41 [Journal]
  41. Li Gong
    Collisionful Keyed Hash Functions with Selectable Collisions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:55, n:3, pp:167-170 [Journal]
  42. Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang
    Practical Protocols for Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal]
  43. Li Gong, D. J. Wheeler
    A Matrix Key-Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1990, v:2, n:1, pp:51-59 [Journal]
  44. Li Gong
    Increasing Availability and Security of an Authentication Service. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:657-662 [Journal]
  45. Li Gong
    Enclaves: Enabling Secure Collaboration Over the Internet. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:567-575 [Journal]
  46. Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer
    Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal]
  47. Li Gong
    On Security in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1989, v:23, n:2, pp:56-60 [Journal]
  48. Li Gong
    A Security Risk of Depending on Synchronized Clocks. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1992, v:26, n:1, pp:49-53 [Journal]
  49. James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford
    Firewalls: An Expert Roundtable. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:5, pp:60-66 [Journal]
  50. Li Gong, Xiaolei Qian
    Enriching the Expressive Power of Security Labels. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:839-841 [Journal]
  51. Li Gong, Xiaolei Qian
    Computational Issues in Secure Interoperation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:1, pp:43-52 [Journal]
  52. Li Gong, Nachum Shacham
    Multicast security and its extension to a mobile environment. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 1995, v:1, n:3, pp:281-295 [Journal]

  53. Java Security: A Ten Year Retrospective. [Citation Graph (, )][DBLP]


  54. Humans and humanoid social robots in communication contexts. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002