Li Gong Lower Bounds on Messages and Rounds for Network Authentication Protocols. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1993, pp:26-37 [Conf]
Li Gong New Protocols for Third-Party-Based Authentication and Secure Broadcast. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:176-183 [Conf]
Li Gong, Jennifer Lai Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude. [Citation Graph (0, 0)][DBLP] CHI, 2001, pp:158-165 [Conf]
Li Gong Handling Infeasible Specifications fo Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 1991, pp:99-102 [Conf]
Li Gong A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 1993, pp:131-136 [Conf]
Li Gong Optimal authentication protocols resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP] CSFW, 1995, pp:24-29 [Conf]
Li Gong Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. [Citation Graph (0, 0)][DBLP] Distributed Computing, 1995, v:9, n:3, pp:131-145 [Journal]
Li Gong Tutorial: Peer to Peer Networks in Action. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2002, v:3, n:1, pp:- [Journal]
Li Gong Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents. [Citation Graph (0, 0)][DBLP] International Journal of Man-Machine Studies, 2007, v:65, n:3, pp:183-191 [Journal]
Li Gong A Software Architecture for Open Service Gateways. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2001, v:5, n:1, pp:64-0 [Journal]
Li Gong Industry Report: JXTA: A Network Programming Environment. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2001, v:5, n:3, pp:88-0 [Journal]
Li Gong Guest Editor's Introduction: Peer-to-Peer Networks in Action. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2002, v:6, n:1, pp:37-39 [Journal]
Li Gong, Ravi S. Sandhu Guest Editors' Introduction: What Makes Security Technologies Relevant? [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2000, v:4, n:6, pp:38-41 [Journal]
Li Gong Collisionful Keyed Hash Functions with Selectable Collisions. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:55, n:3, pp:167-170 [Journal]
Li Gong Increasing Availability and Security of an Authentication Service. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:657-662 [Journal]
Li Gong Enclaves: Enabling Secure Collaboration Over the Internet. [Citation Graph (0, 0)][DBLP] IEEE Journal on Selected Areas in Communications, 1997, v:15, n:3, pp:567-575 [Journal]
Li Gong On Security in Capability-Based Systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1989, v:23, n:2, pp:56-60 [Journal]
Li Gong A Security Risk of Depending on Synchronized Clocks. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1992, v:26, n:1, pp:49-53 [Journal]