|
Search the dblp DataBase
Jun Bi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wenmao Zhang, Jun Bi, Miao Zhang, Zheng Qin
A Trustworthy Email System Based on Instant Messaging. [Citation Graph (0, 0)][DBLP] BIS, 2007, pp:598-609 [Conf]
- Jun Bi, Jianping Wu, Miao Zhang
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:681-691 [Conf]
- Jun Bi, Miao Zhang, Lei Zhao
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:962-971 [Conf]
- Jun Bi, Jianping Wu
A Formal Approach to Conformance Testing of Distributed Routing Protocols. [Citation Graph (0, 0)][DBLP] FORTE, 1999, pp:151-163 [Conf]
- Jun Bi, Jianping Wu, X. Chen
A Concurrent TTCN based Approach to Conformance Testing of Distributed Routing Protocol OSPF v2. [Citation Graph (0, 0)][DBLP] ICCCN, 1998, pp:760-767 [Conf]
- Jun Bi, Xiaoxiang Leng, Jianping Wu
OSPF-TE Scalability Study based on Internal Performance Measurement. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:92- [Conf]
- Xiaoxiang Leng, Jun Bi, Miao Zhang
Study on High Performance IPv4/IPv6 Transition and Access Service. [Citation Graph (0, 0)][DBLP] ISPA, 2006, pp:183-194 [Conf]
- Jun Bi, Jianping Wu
A STREAMS based high performance IP/X.25 router. [Citation Graph (0, 0)][DBLP] ISPAN, 1996, pp:268-273 [Conf]
- Jun Bi, Lei Zhao, Miao Zhang
Application Presence Fingerprinting for NAT-Aware Router. [Citation Graph (0, 0)][DBLP] KES (2), 2006, pp:678-685 [Conf]
- Xiaoxiang Leng, Jun Bi, Miao Zhang
Providing Reliable IPv6 Access Service Based on Overlay Network. [Citation Graph (0, 0)][DBLP] OTM Workshops (2), 2006, pp:1500-1509 [Conf]
- Jun Bi, Xiaoxiang Leng, Jianping Wu
Scalable IPv4/IPv6 Transition: A Peer-to-Peer Based Approach. [Citation Graph (0, 0)][DBLP] DBISP2P, 2006, pp:406-416 [Conf]
- Lizhong Xie, Jun Bi, Jianping Wu
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (4), 2007, pp:801-808 [Conf]
- Yan Shen, Jun Bi, Jianping Wu, Qiang Liu
The Automatic Peer-to-Peer Signature for Source Address Validation. [Citation Graph (0, 0)][DBLP] KES (1), 2007, pp:855-863 [Conf]
- Xiaoxiang Leng, Jun Bi, Miao Zhang, Jianping Wu
Connecting IPvX Networks Over IPvY with a P2P Method. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2007, v:15, n:3, pp:383-399 [Journal]
Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. [Citation Graph (, )][DBLP]
Freeway traffic estimation in Beijing based on particle filter. [Citation Graph (, )][DBLP]
A Trust and Reputation based Anti-SPIM Method. [Citation Graph (, )][DBLP]
A two-level source address spoofing prevention based on automatic signature and verification mechanism. [Citation Graph (, )][DBLP]
A CGAbased IP source address authentication method in IPv6 access network. [Citation Graph (, )][DBLP]
A Multihoming Based IPv4/IPv6 Transition Approach. [Citation Graph (, )][DBLP]
Shim6: Reference Implementation and Optimization. [Citation Graph (, )][DBLP]
A Novel SeND Based Source Address Validation Mechanism (SAVM-SeND). [Citation Graph (, )][DBLP]
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes. [Citation Graph (, )][DBLP]
Design and Implementation of an IPv6 Source Address Validation Device. [Citation Graph (, )][DBLP]
Site Multihoming: Practices, Mechanisms and Perspective. [Citation Graph (, )][DBLP]
A Tunnels-Between-Hosts Based Method for IPv4 Application over Native IPv6 Network. [Citation Graph (, )][DBLP]
An Approach to Optimize Local Trust Algorithm in SureMsg Service. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|