The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jun Bi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wenmao Zhang, Jun Bi, Miao Zhang, Zheng Qin
    A Trustworthy Email System Based on Instant Messaging. [Citation Graph (0, 0)][DBLP]
    BIS, 2007, pp:598-609 [Conf]
  2. Jun Bi, Jianping Wu, Miao Zhang
    Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:681-691 [Conf]
  3. Jun Bi, Miao Zhang, Lei Zhao
    Security Enhancement by Detecting Network Address Translation Based on Instant Messaging. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:962-971 [Conf]
  4. Jun Bi, Jianping Wu
    A Formal Approach to Conformance Testing of Distributed Routing Protocols. [Citation Graph (0, 0)][DBLP]
    FORTE, 1999, pp:151-163 [Conf]
  5. Jun Bi, Jianping Wu, X. Chen
    A Concurrent TTCN based Approach to Conformance Testing of Distributed Routing Protocol OSPF v2. [Citation Graph (0, 0)][DBLP]
    ICCCN, 1998, pp:760-767 [Conf]
  6. Jun Bi, Xiaoxiang Leng, Jianping Wu
    OSPF-TE Scalability Study based on Internal Performance Measurement. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:92- [Conf]
  7. Xiaoxiang Leng, Jun Bi, Miao Zhang
    Study on High Performance IPv4/IPv6 Transition and Access Service. [Citation Graph (0, 0)][DBLP]
    ISPA, 2006, pp:183-194 [Conf]
  8. Jun Bi, Jianping Wu
    A STREAMS based high performance IP/X.25 router. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:268-273 [Conf]
  9. Jun Bi, Lei Zhao, Miao Zhang
    Application Presence Fingerprinting for NAT-Aware Router. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:678-685 [Conf]
  10. Xiaoxiang Leng, Jun Bi, Miao Zhang
    Providing Reliable IPv6 Access Service Based on Overlay Network. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (2), 2006, pp:1500-1509 [Conf]
  11. Jun Bi, Xiaoxiang Leng, Jianping Wu
    Scalable IPv4/IPv6 Transition: A Peer-to-Peer Based Approach. [Citation Graph (0, 0)][DBLP]
    DBISP2P, 2006, pp:406-416 [Conf]
  12. Lizhong Xie, Jun Bi, Jianping Wu
    An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (4), 2007, pp:801-808 [Conf]
  13. Yan Shen, Jun Bi, Jianping Wu, Qiang Liu
    The Automatic Peer-to-Peer Signature for Source Address Validation. [Citation Graph (0, 0)][DBLP]
    KES (1), 2007, pp:855-863 [Conf]
  14. Xiaoxiang Leng, Jun Bi, Miao Zhang, Jianping Wu
    Connecting IPvX Networks Over IPvY with a P2P Method. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2007, v:15, n:3, pp:383-399 [Journal]

  15. Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. [Citation Graph (, )][DBLP]


  16. Freeway traffic estimation in Beijing based on particle filter. [Citation Graph (, )][DBLP]


  17. A Trust and Reputation based Anti-SPIM Method. [Citation Graph (, )][DBLP]


  18. A two-level source address spoofing prevention based on automatic signature and verification mechanism. [Citation Graph (, )][DBLP]


  19. A CGAbased IP source address authentication method in IPv6 access network. [Citation Graph (, )][DBLP]


  20. A Multihoming Based IPv4/IPv6 Transition Approach. [Citation Graph (, )][DBLP]


  21. Shim6: Reference Implementation and Optimization. [Citation Graph (, )][DBLP]


  22. A Novel SeND Based Source Address Validation Mechanism (SAVM-SeND). [Citation Graph (, )][DBLP]


  23. Passive IP traceback: capturing the origin of anonymous traffic through network telescopes. [Citation Graph (, )][DBLP]


  24. Design and Implementation of an IPv6 Source Address Validation Device. [Citation Graph (, )][DBLP]


  25. Site Multihoming: Practices, Mechanisms and Perspective. [Citation Graph (, )][DBLP]


  26. A Tunnels-Between-Hosts Based Method for IPv4 Application over Native IPv6 Network. [Citation Graph (, )][DBLP]


  27. An Approach to Optimize Local Trust Algorithm in SureMsg Service. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002