Author of the publication

RVIP: an indistinguishable approach to scalable network simulation at real time.

, , and . Wireless Communications and Mobile Computing, 15 (18): 2219-2232 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kong, Jiejun
add a person with the name Kong, Jiejun
 

Other publications of authors with the same name

Self-securing ad hoc wireless networks., , , , and . ISCC, page 567-574. IEEE Computer Society, (2002)Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes., , and . IEEE Trans. Vehicular Technology, 58 (5): 2406-2416 (2009)Adaptive security for multilevel ad hoc networks., , , , , and . Wireless Communications and Mobile Computing, 2 (5): 533-547 (2002)Ad Hoc Network Security., , , , , , and . Mobile Computing Handbook, CRC Press, (2004)Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks., , , and . IACR Cryptology ePrint Archive, (2011)Filtering false data via authentic consensus in vehicle ad hoc networks., , , , and . IJAACS, 3 (2): 217-235 (2010)ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks., and . MobiHoc, page 291-302. ACM, (2003)ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains., , , and . Workshop on Wireless Security, page 51-60. ACM, (2003)Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks., , , , , and . Workshop on Wireless Security, page 87-96. ACM, (2005)RVIP: an indistinguishable approach to scalable network simulation at real time., , and . Wireless Communications and Mobile Computing, 15 (18): 2219-2232 (2015)