The SCEAS System
Navigation Menu

Search the dblp DataBase


Jiejun Kong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cindy Xinmin Chen, Jiejun Kong, Carlo Zaniolo
    Design and Implementation of a Temporal Extension of SQL. [Citation Graph (0, 0)][DBLP]
    ICDE, 2003, pp:689-691 [Conf]
  2. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang
    Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2001, pp:251-260 [Conf]
  3. Jiejun Kong, Xiaoyan Hong, M. Y. Sanadidi, Mario Gerla
    Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:57-62 [Conf]
  4. Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu, Lixia Zhang
    Self-securing ad hoc wireless networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2002, pp:567-574 [Conf]
  5. Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio Magistretti, Mario Gerla
    Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:609-615 [Conf]
  6. Jiejun Kong, Xiaoyan Hong
    ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2003, pp:291-302 [Conf]
  7. Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu, Mario Gerla
    A secure ad-hoc routing approach using localized self-healing communities. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2005, pp:254-265 [Conf]
  8. Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla
    Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:97-106 [Conf]
  9. Jiejun Kong, Shirshanka Das, Edward Tsai, Mario Gerla
    ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2003, pp:51-60 [Conf]
  10. Jun-Hong Cui, Jiejun Kong, Mario Gerla, Shengli Zhou
    The challenges of building mobile underwater wireless networks for aquatic applications. [Citation Graph (0, 0)][DBLP]
    IEEE Network, 2006, v:20, n:3, pp:12-18 [Journal]
  11. Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, Lixia Zhang
    URSA: ubiquitous and robust access control for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 2004, v:12, n:6, pp:1049-1063 [Journal]
  12. Xiaoyan Hong, Jiejun Kong, Mario Gerla
    Mobility changes anonymity: new passive threats in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:281-293 [Journal]
  13. Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, Songwu Lu
    Adaptive security for multilevel ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2002, v:2, n:5, pp:533-547 [Journal]
  14. Uichin Lee, Jiejun Kong, Mario Gerla, Joon-Sang Park, Eugenio Magistretti
    Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:6, pp:943-958 [Journal]
  15. Jiejun Kong, Xiaoyan Hong, Mario Gerla
    An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:8, pp:888-902 [Journal]

  16. Complexity-theoretic Modeling of Biological Cyanide Poisoning as Security Attack in Self-organizing Networks. [Citation Graph (, )][DBLP]

  17. Modeling Ad-hoc rushing attack in a negligibility-based security framework. [Citation Graph (, )][DBLP]

  18. Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks. [Citation Graph (, )][DBLP]

  19. A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact. [Citation Graph (, )][DBLP]

  20. CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002