Author of the publication

An Enhanced Digital Content Mediator (DCM) Approach to Implementing Legitimate and Secure P2P Online Transactions.

, , , , , and . ICC, page 2351-2356. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kong, Jiejun
add a person with the name Kong, Jiejun
 

Other publications of authors with the same name

Filtering false data via authentic consensus in vehicle ad hoc networks., , , , and . IJAACS, 3 (2): 217-235 (2010)Adaptive security for multilevel ad hoc networks., , , , , and . Wireless Communications and Mobile Computing, 2 (5): 533-547 (2002)Ad Hoc Network Security., , , , , , and . Mobile Computing Handbook, CRC Press, (2004)Self-securing ad hoc wireless networks., , , , and . ISCC, page 567-574. IEEE Computer Society, (2002)Protection Against Mobile Tracing Through Motion-MIX for Mobile Wireless Nodes., , and . IEEE Trans. Vehicular Technology, 58 (5): 2406-2416 (2009)Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks., , , and . IACR Cryptology ePrint Archive, (2011)Mobility changes anonymity: new passive threats in mobile ad hoc networks., , and . Wireless Communications and Mobile Computing, (2006)The challenges of building mobile underwater wireless networks for aquatic applications., , , and . IEEE Network, 20 (3): 12-18 (2006)RVIP: an indistinguishable approach to scalable network simulation at real time., , and . Wireless Communications and Mobile Computing, 15 (18): 2219-2232 (2015)Design and Implementation of a Temporal Extension of SQL., , and . ICDE, page 689-691. IEEE Computer Society, (2003)