2009 |
24 | EE | Jun Bi,
Guang Yao,
Jianping Wu:
An IPv6 Source Address Validation Testbed and Prototype Implementation.
JNW 4(2): 100-107 (2009) |
2008 |
23 | | Abdelhamid Mellouk,
Jun Bi,
Guadalupe Ortiz,
Dickson K. W. Chiu,
Manuela Popescu:
Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece
IEEE Computer Society 2008 |
22 | EE | Xiangbin Cheng,
Jun Bi,
Xing Li:
Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks.
ICN 2008: 267-272 |
21 | EE | Jun Bi,
Jianping Wu,
Wenmao Zhang:
A Trust and Reputation based Anti-SPIM Method.
INFOCOM 2008: 2485-2493 |
20 | EE | Yan Shen,
Jun Bi,
Jianping Wu,
Qiang Liu:
A two-level source address spoofing prevention based on automatic signature and verification mechanism.
ISCC 2008: 392-397 |
19 | EE | Guang Yao,
Jun Bi:
A CGAbased IP source address authentication method in IPv6 access network.
LCN 2008: 534-535 |
18 | EE | Jun Bi,
Ping Hu,
Lizhong Xie:
Shim6: Reference Implementation and Optimization.
Networking 2008: 302-313 |
2007 |
17 | EE | Wenmao Zhang,
Jun Bi,
Miao Zhang,
Zheng Qin:
A Trustworthy Email System Based on Instant Messaging.
BIS 2007: 598-609 |
16 | EE | Jun Bi,
Ping Hu,
Lizhong Xie:
Site Multihoming: Practices, Mechanisms and Perspective.
FGCN (1) 2007: 535-540 |
15 | EE | Lizhong Xie,
Jun Bi,
Jianping Wu:
An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network.
International Conference on Computational Science (4) 2007: 801-808 |
14 | EE | Yan Shen,
Jun Bi,
Jianping Wu,
Qiang Liu:
The Automatic Peer-to-Peer Signature for Source Address Validation.
KES (1) 2007: 855-863 |
13 | EE | Lizhong Xie,
Jun Bi,
Jianping Wu:
A Multihoming Based IPv4/IPv6 Transition Approach.
Networking 2007: 902-911 |
12 | EE | Jun Bi,
Jianping Wu,
Wenmao Zhang:
SureMsg: a XMPP-based security e-mail system.
IJIIDS 1(2): 199-215 (2007) |
11 | EE | Xiaoxiang Leng,
Jun Bi,
Miao Zhang,
Jianping Wu:
Connecting IPvX Networks Over IPvY with a P2P Method.
J. Network Syst. Manage. 15(3): 383-399 (2007) |
2006 |
10 | EE | Jun Bi,
Xiaoxiang Leng,
Jianping Wu:
Scalable IPv4/IPv6 Transition: A Peer-to-Peer Based Approach.
DBISP2P 2006: 406-416 |
9 | EE | Jun Bi,
Jianping Wu,
Miao Zhang:
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.
EUC Workshops 2006: 681-691 |
8 | EE | Jun Bi,
Miao Zhang,
Lei Zhao:
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.
EUC Workshops 2006: 962-971 |
7 | EE | Jun Bi,
Xiaoxiang Leng,
Jianping Wu:
OSPF-TE Scalability Study based on Internal Performance Measurement.
ICN/ICONS/MCL 2006: 92 |
6 | EE | Xiaoxiang Leng,
Jun Bi,
Miao Zhang:
Study on High Performance IPv4/IPv6 Transition and Access Service.
ISPA 2006: 183-194 |
5 | EE | Jun Bi,
Lei Zhao,
Miao Zhang:
Application Presence Fingerprinting for NAT-Aware Router.
KES (2) 2006: 678-685 |
4 | EE | Xiaoxiang Leng,
Jun Bi,
Miao Zhang:
Providing Reliable IPv6 Access Service Based on Overlay Network.
OTM Workshops (2) 2006: 1500-1509 |
1999 |
3 | | Jun Bi,
Jianping Wu:
A Formal Approach to Conformance Testing of Distributed Routing Protocols.
FORTE 1999: 151-163 |
1998 |
2 | EE | Jun Bi,
Jianping Wu,
X. Chen:
A Concurrent TTCN based Approach to Conformance Testing of Distributed Routing Protocol OSPF v2.
ICCCN 1998: 760-767 |
1996 |
1 | EE | Jun Bi,
Jianping Wu:
A STREAMS based high performance IP/X.25 router.
ISPAN 1996: 268-273 |