2008 | ||
---|---|---|
53 | EE | Tina Hernandez-Boussard, Michelle Whirl Carrillo, Joan M. Hebert, Li Gong, Ryan Owen, Mei Gong, Winston Gor, Feng Liu, Chuong Truong, Ryan Whaley, Mark Woon, Tina Zhou, Russ B. Altman, Teri E. Klein: The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge. Nucleic Acids Research 36(Database-Issue): 913-918 (2008) |
2007 | ||
52 | EE | Li Gong: Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents. International Journal of Man-Machine Studies 65(3): 183-191 (2007) |
2004 | ||
51 | EE | Simon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap: Guest Editors' Introduction: Securing the High-Speed Internet. IEEE Computer 37(6): 33-35 (2004) |
50 | EE | Li Gong: It's China(town). IEEE Internet Computing 8(5): 103-104 (2004) |
2003 | ||
49 | Li Gong: Is Cross-Platform Security Possible? ACISP 2003: 402 | |
48 | Li Gong: Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust. INTERACT 2003 | |
47 | EE | Li Gong: A New Column for a New Year. IEEE Internet Computing 7(1): 96 (2003) |
46 | EE | Li Gong: Why Cross-Platform Security. IEEE Internet Computing 7(3): 95-96 (2003) |
2002 | ||
45 | EE | Li Gong: Tutorial: Peer to Peer Networks in Action. IEEE Distributed Systems Online 3(1): (2002) |
44 | EE | Li Gong: Guest Editor's Introduction: Peer-to-Peer Networks in Action. IEEE Internet Computing 6(1): 37-39 (2002) |
2001 | ||
43 | EE | Li Gong, Jennifer Lai: Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude. CHI 2001: 158-165 |
42 | EE | Li Gong: A Software Architecture for Open Service Gateways. IEEE Internet Computing 5(1): 64- (2001) |
41 | EE | Li Gong: Industry Report: JXTA: A Network Programming Environment. IEEE Internet Computing 5(3): 88- (2001) |
2000 | ||
40 | EE | Li Gong: Developing Security Systems in the Real World. ECOOP 2000: 251 |
39 | EE | Clifford Nass, Li Gong: Speech interfaces from an evolutionary perspective. Commun. ACM 43(9): 36-43 (2000) |
38 | EE | Li Gong, Ravi S. Sandhu: Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6): 38-41 (2000) |
1999 | ||
37 | EE | Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers: User Authentication and Authorization in the Java(tm) Platform. ACSAC 1999: 285-290 |
36 | EE | Li Gong, Satya Dodda: Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). HASE 1999: 89- |
1998 | ||
35 | EE | Peter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166 |
34 | EE | Dirk Balfanz, Li Gong: Experience with Secure Multi-Processing in Java. ICDCS 1998: 398-405 |
33 | EE | Li Gong, Roland Schemers: Signing, Sealing, and Guarding Java Objects. Mobile Agents and Security 1998: 206-216 |
32 | EE | Li Gong, Roland Schemers: Implementing Protection Domains in the JavaTM Development Kit 1.2. NDSS 1998 |
31 | Li Gong: Secure Java Class Loading. IEEE Internet Computing 2(6): 56-61 (1998) | |
1997 | ||
30 | EE | Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox: Ensuring Assurance in Mobile Computing. IEEE Symposium on Security and Privacy 1997: 114-118 |
29 | EE | Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong: Secure Software Architectures. IEEE Symposium on Security and Privacy 1997: 84-93 |
28 | EE | Li Gong, Marianne Mueller, Hemma Prafullchandra, Roland Schemers: Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. USENIX Symposium on Internet Technologies and Systems 1997 |
27 | Li Gong: Enclaves: Enabling Secure Collaboration Over the Internet. IEEE Journal on Selected Areas in Communications 15(3): 567-575 (1997) | |
26 | James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford: Firewalls: An Expert Roundtable. IEEE Software 14(5): 60-66 (1997) | |
1996 | ||
25 | EE | Simon N. Foley, Li Gong, Xiaolei Qian: A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. IEEE Symposium on Security and Privacy 1996: 142-153 |
24 | EE | Li Gong, Xiaolei Qian: Computational Issues in Secure Interoperation. IEEE Trans. Software Eng. 22(1): 43-52 (1996) |
23 | EE | Robert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang: Practical Protocols for Certified Electronic Mail. J. Network Syst. Manage. 4(3): (1996) |
1995 | ||
22 | EE | Li Gong: Optimal authentication protocols resistant to password guessing attacks. CSFW 1995: 24-29 |
21 | Michael K. Reiter, Li Gong: Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995) | |
20 | Li Gong: Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. Distributed Computing 9(3): 131-145 (1995) | |
19 | EE | Li Gong, Xiaolei Qian: Enriching the Expressive Power of Security Labels. IEEE Trans. Knowl. Data Eng. 7(5): 839-841 (1995) |
18 | EE | Li Gong: Collisionful Keyed Hash Functions with Selectable Collisions. Inf. Process. Lett. 55(3): 167-170 (1995) |
17 | Li Gong, Nachum Shacham: Multicast security and its extension to a mobile environment. Wireless Networks 1(3): 281-295 (1995) | |
1994 | ||
16 | EE | Li Gong: New Protocols for Third-Party-Based Authentication and Secure Broadcast. ACM Conference on Computer and Communications Security 1994: 176-183 |
1993 | ||
15 | EE | Li Gong: Lower Bounds on Messages and Rounds for Network Authentication Protocols. ACM Conference on Computer and Communications Security 1993: 26-37 |
14 | Li Gong: A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. CSFW 1993: 131-136 | |
13 | Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993) | |
12 | Li Gong: Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications 11(5): 657-662 (1993) | |
1992 | ||
11 | EE | John A. Bull, Li Gong, Karen R. Sollins: Towards Security in an Open Systems Federation. ESORICS 1992: 3-20 |
10 | Li Gong: A Security Risk of Depending on Synchronized Clocks. Operating Systems Review 26(1): 49-53 (1992) | |
1991 | ||
9 | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226 | |
8 | Li Gong: Handling Infeasible Specifications fo Cryptographic Protocols. CSFW 1991: 99-102 | |
1990 | ||
7 | Li Gong, Roger M. Needham, Raphael Yahalom: Reasoning about Belief in Cryptographic Protocols. IEEE Symposium on Security and Privacy 1990: 234-248 | |
6 | Li Gong: Verifiable-Text Attacks in Cryptographic Protocols. INFOCOM 1990: 686-693 | |
5 | Li Gong, D. J. Wheeler: A Matrix Key-Distribution Scheme. J. Cryptology 2(1): 51-59 (1990) | |
1989 | ||
4 | Li Gong: Securely Replicating Authentication Services. ICDCS 1989: 85-93 | |
3 | Li Gong: A Secure Identity-Based Capability System. IEEE Symposium on Security and Privacy 1989: 56-65 | |
2 | T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham: Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18 | |
1 | Li Gong: On Security in Capability-Based Systems. Operating Systems Review 23(2): 56-60 (1989) |