Li Gong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

53EETina Hernandez-Boussard, Michelle Whirl Carrillo, Joan M. Hebert, Li Gong, Ryan Owen, Mei Gong, Winston Gor, Feng Liu, Chuong Truong, Ryan Whaley, Mark Woon, Tina Zhou, Russ B. Altman, Teri E. Klein: The pharmacogenetics and pharmacogenomics knowledge base: accentuating the knowledge. Nucleic Acids Research 36(Database-Issue): 913-918 (2008)
52EELi Gong: Is happy better than sad even if they are both non-adaptive? Effects of emotional expressions of talking-head interface agents. International Journal of Man-Machine Studies 65(3): 183-191 (2007)
51EESimon S. Y. Shim, Li Gong, Aviel D. Rubin, Linley Gwennap: Guest Editors' Introduction: Securing the High-Speed Internet. IEEE Computer 37(6): 33-35 (2004)
50EELi Gong: It's China(town). IEEE Internet Computing 8(5): 103-104 (2004)
49 Li Gong: Is Cross-Platform Security Possible? ACISP 2003: 402
48 Li Gong: Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust. INTERACT 2003
47EELi Gong: A New Column for a New Year. IEEE Internet Computing 7(1): 96 (2003)
46EELi Gong: Why Cross-Platform Security. IEEE Internet Computing 7(3): 95-96 (2003)
45EELi Gong: Tutorial: Peer to Peer Networks in Action. IEEE Distributed Systems Online 3(1): (2002)
44EELi Gong: Guest Editor's Introduction: Peer-to-Peer Networks in Action. IEEE Internet Computing 6(1): 37-39 (2002)
43EELi Gong, Jennifer Lai: Shall we mix synthetic speech and human speech?: impact on users' performance, perception, and attitude. CHI 2001: 158-165
42EELi Gong: A Software Architecture for Open Service Gateways. IEEE Internet Computing 5(1): 64- (2001)
41EELi Gong: Industry Report: JXTA: A Network Programming Environment. IEEE Internet Computing 5(3): 88- (2001)
40EELi Gong: Developing Security Systems in the Real World. ECOOP 2000: 251
39EEClifford Nass, Li Gong: Speech interfaces from an evolutionary perspective. Commun. ACM 43(9): 36-43 (2000)
38EELi Gong, Ravi S. Sandhu: Guest Editors' Introduction: What Makes Security Technologies Relevant? IEEE Internet Computing 4(6): 38-41 (2000)
37EECharlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers: User Authentication and Authorization in the Java(tm) Platform. ACSAC 1999: 285-290
36EELi Gong, Satya Dodda: Security Assurance Efforts in Engineering Java 2 SE (JDK 1.2). HASE 1999: 89-
35EEPeter Y. A. Ryan, Dieter Gollmann, Li Gong, Günter Karjoth, Chris J. Mitchell: Panel Introduction: The Security Impact of Distributed Computing Technologies. CSFW 1998: 164-166
34EEDirk Balfanz, Li Gong: Experience with Secure Multi-Processing in Java. ICDCS 1998: 398-405
33EELi Gong, Roland Schemers: Signing, Sealing, and Guarding Java Objects. Mobile Agents and Security 1998: 206-216
32EELi Gong, Roland Schemers: Implementing Protection Domains in the JavaTM Development Kit 1.2. NDSS 1998
31 Li Gong: Secure Java Class Loading. IEEE Internet Computing 2(6): 56-61 (1998)
30EEMarvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox: Ensuring Assurance in Mobile Computing. IEEE Symposium on Security and Privacy 1997: 114-118
29EEMark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong: Secure Software Architectures. IEEE Symposium on Security and Privacy 1997: 84-93
28EELi Gong, Marianne Mueller, Hemma Prafullchandra, Roland Schemers: Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2. USENIX Symposium on Internet Technologies and Systems 1997
27 Li Gong: Enclaves: Enabling Secure Collaboration Over the Internet. IEEE Journal on Selected Areas in Communications 15(3): 567-575 (1997)
26 James P. Anderson, Sheila Brand, Li Gong, Thomas Haigh, Steven B. Lipner, Teresa F. Lunt, Ruth Nelson, William Neugent, Hilarie K. Orman, Marcus J. Ranum, Roger R. Schell, Eugene H. Spafford: Firewalls: An Expert Roundtable. IEEE Software 14(5): 60-66 (1997)
25EESimon N. Foley, Li Gong, Xiaolei Qian: A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. IEEE Symposium on Security and Privacy 1996: 142-153
24EELi Gong, Xiaolei Qian: Computational Issues in Secure Interoperation. IEEE Trans. Software Eng. 22(1): 43-52 (1996)
23EERobert H. Deng, Li Gong, Aurel A. Lazar, Weiguo Wang: Practical Protocols for Certified Electronic Mail. J. Network Syst. Manage. 4(3): (1996)
22EELi Gong: Optimal authentication protocols resistant to password guessing attacks. CSFW 1995: 24-29
21 Michael K. Reiter, Li Gong: Securing Causal Relationships in Distributed Systems. Comput. J. 38(8): 633-642 (1995)
20 Li Gong: Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations. Distributed Computing 9(3): 131-145 (1995)
19EELi Gong, Xiaolei Qian: Enriching the Expressive Power of Security Labels. IEEE Trans. Knowl. Data Eng. 7(5): 839-841 (1995)
18EELi Gong: Collisionful Keyed Hash Functions with Selectable Collisions. Inf. Process. Lett. 55(3): 167-170 (1995)
17 Li Gong, Nachum Shacham: Multicast security and its extension to a mobile environment. Wireless Networks 1(3): 281-295 (1995)
16EELi Gong: New Protocols for Third-Party-Based Authentication and Secure Broadcast. ACM Conference on Computer and Communications Security 1994: 176-183
15EELi Gong: Lower Bounds on Messages and Rounds for Network Authentication Protocols. ACM Conference on Computer and Communications Security 1993: 26-37
14 Li Gong: A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. CSFW 1993: 131-136
13 Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993)
12 Li Gong: Increasing Availability and Security of an Authentication Service. IEEE Journal on Selected Areas in Communications 11(5): 657-662 (1993)
11EEJohn A. Bull, Li Gong, Karen R. Sollins: Towards Security in an Open Systems Federation. ESORICS 1992: 3-20
10 Li Gong: A Security Risk of Depending on Synchronized Clocks. Operating Systems Review 26(1): 49-53 (1992)
9 Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong: Logics for Cryptographic Protocols - Virtues and Limitations. CSFW 1991: 219-226
8 Li Gong: Handling Infeasible Specifications fo Cryptographic Protocols. CSFW 1991: 99-102
7 Li Gong, Roger M. Needham, Raphael Yahalom: Reasoning about Belief in Cryptographic Protocols. IEEE Symposium on Security and Privacy 1990: 234-248
6 Li Gong: Verifiable-Text Attacks in Cryptographic Protocols. INFOCOM 1990: 686-693
5 Li Gong, D. J. Wheeler: A Matrix Key-Distribution Scheme. J. Cryptology 2(1): 51-59 (1990)
4 Li Gong: Securely Replicating Authentication Services. ICDCS 1989: 85-93
3 Li Gong: A Secure Identity-Based Capability System. IEEE Symposium on Security and Privacy 1989: 56-65
2 T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham: Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18
1 Li Gong: On Security in Capability-Based Systems. Operating Systems Review 23(2): 56-60 (1989)

Coauthor Index

1Russ B. Altman [53]
2James P. Anderson [26]
3Dirk Balfanz [34]
4Sheila Brand [26]
5John A. Bull [11]
6Michelle Whirl Carrillo [53]
7Drew Dean [30]
8Robert H. Deng (Robert Huijie Deng) [23]
9Satya Dodda [36]
10Simon N. Foley [25]
11Barbara Fox [30]
12Virgil D. Gligor [9]
13Dieter Gollmann [35]
14Mei Gong [53]
15Winston Gor [53]
16Linley Gwennap [51]
17Thomas Haigh [26]
18Joan M. Hebert [53]
19Tina Hernandez-Boussard [53]
20Rajashekar Kailar [9]
21Günter Karjoth [35]
22Teri E. Klein [53]
23Larry Koved [37]
24Charlie Lai [37]
25Jennifer Lai [43]
26Aurel A. Lazar [23]
27Steven B. Lipner [26]
28Feng Liu [53]
29T. Mark A. Lomas [2] [13]
30Teresa F. Lunt [26]
31Chris J. Mitchell [35]
32Mark Moriconi [29]
33Marianne Mueller [28]
34Anthony J. Nadalin [37]
35Clifford Nass [39]
36Roger M. Needham [2] [7] [13]
37Ruth Nelson [26]
38William Neugent [26]
39Hilarie K. Orman [26]
40Ryan Owen [53]
41Sylvan Pinsky [30]
42Hemma Prafullchandra [28]
43Xiaolei Qian [19] [24] [25] [29]
44Marcus J. Ranum [26]
45Michael K. Reiter [21]
46Robert A. Riemenschneider [29]
47Jim Roskind [30]
48Aviel D. Rubin [51]
49Peter Y. A. Ryan (Peter Ryan) [35]
50Jerome H. Saltzer [2] [13]
51Ravi S. Sandhu [38]
52Marvin Schaefer [30]
53Roger R. Schell [26]
54Roland Schemers [28] [32] [33] [37]
55Nachum Shacham [17]
56Simon S. Y. Shim [51]
57Karen R. Sollins [11]
58Eugene H. Spafford [26]
59Stuart G. Stubblebine [9]
60Chuong Truong [53]
61Weiguo Wang [23]
62Ryan Whaley [53]
63D. J. Wheeler [5]
64Mark Woon [53]
65Raphael Yahalom [7]
66Tina Zhou [53]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)