BibTeX records: Ronggong Song

download as .bib file

@inproceedings{DBLP:conf/icmcis/SongW19,
  author       = {Ronggong Song and
                  Tricia J. Willink},
  title        = {Machine Learning-Based Traffic Classification of Wireless Traffic},
  booktitle    = {International Conference on Military Communications and Information
                  Systems, {ICMCIS} 2019, Budva, Montenegro, May 14-15, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICMCIS.2019.8842671},
  doi          = {10.1109/ICMCIS.2019.8842671},
  timestamp    = {Fri, 19 Apr 2024 12:37:10 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/SongW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcis/SongBTS15,
  author       = {Ronggong Song and
                  J. David Brown and
                  Helen Tang and
                  Mazda Salmanian},
  title        = {Secure and efficient routing by Leveraging Situational Awareness Messages
                  in tactical edge networks},
  booktitle    = {International Conference on Military Communications and Information
                  Systems, {ICMCIS} 2015, Cracow, Poland, May 18-19, 2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICMCIS.2015.7158713},
  doi          = {10.1109/ICMCIS.2015.7158713},
  timestamp    = {Mon, 22 Apr 2024 10:49:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/SongBTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SalmanianBWSTS15,
  author       = {Mazda Salmanian and
                  J. David Brown and
                  Susan Watson and
                  Ronggong Song and
                  Helen Tang and
                  Darcy Simmelink},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {An architecture for secure interoperability between coalition tactical
                  MANETs},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357415},
  doi          = {10.1109/MILCOM.2015.7357415},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/SalmanianBWSTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SongBMST15,
  author       = {Ronggong Song and
                  J. David Brown and
                  Peter C. Mason and
                  Mazda Salmanian and
                  Helen Tang},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {{HMS:} Holistic {MPR} selection and network connectivity for tactical
                  edge networks},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {726--731},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357530},
  doi          = {10.1109/MILCOM.2015.7357530},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SongBMST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SongTMW13,
  author       = {Ronggong Song and
                  Helen Tang and
                  Peter C. Mason and
                  Zhexiong Wei},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {Cross-Layer Security Management Framework for Mobile Tactical Networks},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.46},
  doi          = {10.1109/MILCOM.2013.46},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SongTMW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SongT12,
  author       = {Ronggong Song and
                  Helen Tang},
  title        = {{LAA:} Link-layer anonymous access for tactical MANETs},
  booktitle    = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
                  FL, USA, October 29 - November 1, 2012},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MILCOM.2012.6415724},
  doi          = {10.1109/MILCOM.2012.6415724},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SongT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SongML11,
  author       = {Ronggong Song and
                  Peter C. Mason and
                  Ming Li},
  title        = {Enhancement of frequency-based wormhole attack detection},
  booktitle    = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore,
                  MD, USA, November 7-10, 2011},
  pages        = {1139--1145},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/MILCOM.2011.6127452},
  doi          = {10.1109/MILCOM.2011.6127452},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SongML11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/Song10,
  author       = {Ronggong Song},
  title        = {Advanced smart card based password authentication protocol},
  journal      = {Comput. Stand. Interfaces},
  volume       = {32},
  number       = {5-6},
  pages        = {321--325},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.csi.2010.03.008},
  doi          = {10.1016/J.CSI.2010.03.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/Song10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SongEM09,
  author       = {Ronggong Song and
                  Khalil El{-}Khatib and
                  Peter C. Mason},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Analysis of Chinese Remainder Theorem Based Group Key Management Protocols},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {86--92},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Sat, 19 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SongEM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/SongKY08,
  author       = {Ronggong Song and
                  Larry Korba and
                  George O. M. Yee},
  title        = {A Scalable Group Key Management Protocol},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {12},
  number       = {7},
  pages        = {541--543},
  year         = {2008},
  url          = {https://doi.org/10.1109/LCOMM.2008.080430},
  doi          = {10.1109/LCOMM.2008.080430},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/SongKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/YeeKS08,
  author       = {George O. M. Yee and
                  Larry Korba and
                  Ronggong Song},
  editor       = {Yuhua Luo},
  title        = {Cooperative Visualization of Privacy Risks},
  booktitle    = {Cooperative Design, Visualization, and Engineering, 5th International
                  Conference, {CDVE} 2008, Calvi{\`{a}}, Mallorca, Spain, September
                  21-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5220},
  pages        = {45--53},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88011-0\_6},
  doi          = {10.1007/978-3-540-88011-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/YeeKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/KorbaWGSYPBLY08,
  author       = {Larry Korba and
                  Yunli Wang and
                  Liqiang Geng and
                  Ronggong Song and
                  George Yee and
                  Andrew S. Patrick and
                  Scott Buffett and
                  Hongyu Liu and
                  Yonghua You},
  editor       = {Yuhua Luo},
  title        = {Private Data Discovery for Privacy Compliance in Collaborative Environments},
  booktitle    = {Cooperative Design, Visualization, and Engineering, 5th International
                  Conference, {CDVE} 2008, Calvi{\`{a}}, Mallorca, Spain, September
                  21-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5220},
  pages        = {142--150},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88011-0\_18},
  doi          = {10.1007/978-3-540-88011-0\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/KorbaWGSYPBLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dmin/SongKY08,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  editor       = {Robert Stahlbock and
                  Sven F. Crone and
                  Stefan Lessmann},
  title        = {An Efficient Privacy-Preserving Data Mining Platform},
  booktitle    = {Proceedings of The 2008 International Conference on Data Mining, {DMIN}
                  2008, July 14-17, 2008, Las Vegas, USA, 2 Volumes},
  pages        = {480--486},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Wed, 28 Oct 2009 09:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/dmin/SongKY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YeeKS08,
  author       = {George O. M. Yee and
                  Larry Korba and
                  Ronggong Song},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Assessing the Likelihood of Privacy Policy Compliance},
  booktitle    = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  pages        = {723--727},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-09699-5\_52},
  doi          = {10.1007/978-0-387-09699-5\_52},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YeeKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/SongKYC07,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee and
                  Ying{-}Chieh Chen},
  title        = {Protect Virtual Property in Online Gaming System},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {17},
  number       = {4},
  pages        = {483--496},
  year         = {2007},
  url          = {https://doi.org/10.1142/S0218194007003367},
  doi          = {10.1142/S0218194007003367},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/SongKYC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/KorbaSY07,
  author       = {Larry Korba and
                  Ronggong Song and
                  George Yee},
  title        = {Privacy Rights Management: Implementation Scenarios},
  journal      = {Inf. Resour. Manag. J.},
  volume       = {20},
  number       = {1},
  pages        = {14--27},
  year         = {2007},
  url          = {https://doi.org/10.4018/irmj.2007010102},
  doi          = {10.4018/IRMJ.2007010102},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irmj/KorbaSY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SongKY07,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  title        = {Privacy Rights Management for Privacy Compliance Systems},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {620--625},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.294},
  doi          = {10.1109/AINAW.2007.294},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SongKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/KorbaSYPBWG07,
  author       = {Larry Korba and
                  Ronggong Song and
                  George Yee and
                  Andrew S. Patrick and
                  Scott Buffett and
                  Yunli Wang and
                  Liqiang Geng},
  editor       = {Yuhua Luo},
  title        = {Private Data Management in Collaborative Environments},
  booktitle    = {Cooperative Design, Visualization, and Engineering, 4th International
                  Conference, {CDVE} 2007, Shanghai, China, September 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4674},
  pages        = {88--96},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74780-2\_10},
  doi          = {10.1007/978-3-540-74780-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/KorbaSYPBWG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/SongKY07,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Analysis of Smart Card-Based Remote User Authentication Schemes},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {323--329},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/SongKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/SongKY07,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  title        = {Privacy management system using social networking},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Montr{\'{e}}al, Canada, 7-10 October 2007},
  pages        = {3327--3332},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSMC.2007.4414220},
  doi          = {10.1109/ICSMC.2007.4414220},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/SongKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YeeKS06,
  author       = {George Yee and
                  Larry Korba and
                  Ronggong Song},
  title        = {Ensuring Privacy for E-Health Services},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {321--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.59},
  doi          = {10.1109/ARES.2006.59},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YeeKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YeeKSC06,
  author       = {George Yee and
                  Larry Korba and
                  Ronggong Song and
                  Ying{-}Chieh Chen},
  title        = {Towards Designing Secure Online Games},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {44--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.333},
  doi          = {10.1109/AINA.2006.333},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/YeeKSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/KorbaSYP06,
  author       = {Larry Korba and
                  Ronggong Song and
                  George Yee and
                  Andrew S. Patrick},
  editor       = {Yuhua Luo},
  title        = {Automated Social Network Analysis for Collaborative Work},
  booktitle    = {Cooperative Design, Visualization, and Engineering, Third International
                  Conference, {CDVE} 2006, Mallorca, Spain, September 17-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4101},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863649\_1},
  doi          = {10.1007/11863649\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/KorbaSYP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YeeKS06,
  author       = {George Yee and
                  Larry Korba and
                  Ronggong Song},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Kai Rannenberg and
                  Louise Yngstr{\"{o}}m and
                  Stefan Lindskog},
  title        = {Ensuring Privacy for Buyer-Seller E-Commerce},
  booktitle    = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
                  {TC-11} 21st International Information Security Conference {(SEC}
                  2006), 22-24 May 2006, Karlstad, Sweden},
  series       = {{IFIP}},
  volume       = {201},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-33406-8\_2},
  doi          = {10.1007/0-387-33406-8\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YeeKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/ChenCHKSY05,
  author       = {Ying{-}Chieh Chen and
                  Patrick S. Chen and
                  Jing{-}Jang Hwang and
                  Larry Korba and
                  Ronggong Song and
                  George Yee},
  title        = {An analysis of online gaming crime characteristics},
  journal      = {Internet Res.},
  volume       = {15},
  number       = {3},
  pages        = {246--261},
  year         = {2005},
  url          = {https://doi.org/10.1108/10662240510602672},
  doi          = {10.1108/10662240510602672},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/ChenCHKSY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/XuSKWSL05,
  author       = {Yuefei Xu and
                  Ronggong Song and
                  Larry Korba and
                  Lihui Wang and
                  Weiming Shen and
                  Sherman Y. T. Lang},
  title        = {Distributed device networks with security constraints},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {1},
  number       = {4},
  pages        = {217--225},
  year         = {2005},
  url          = {https://doi.org/10.1109/TII.2005.843826},
  doi          = {10.1109/TII.2005.843826},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/XuSKWSL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdve/KorbaXSY05,
  author       = {Larry Korba and
                  Yuefei Xu and
                  Ronggong Song and
                  George Yee},
  editor       = {Yuhua Luo},
  title        = {Environmentally-Aware Security Enforcement {(EASE)} for Cooperative
                  Design and Engineering},
  booktitle    = {Cooperative Design, Visualization, and Engineering, Second International
                  Conference, {CDVE} 2005, Palma de Mallorca, Spain, September 18-21,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3675},
  pages        = {140--148},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555223\_16},
  doi          = {10.1007/11555223\_16},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/cdve/KorbaXSY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dms/SongKYC05,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee and
                  Ying{-}Chieh Chen},
  editor       = {Angela Guercio and
                  Timothy Arndt},
  title        = {Protection of Virtual Property in Online Gaming},
  booktitle    = {Proceedings of the 11th International Conference on Distributed Multimedia
                  Systems, {DMS} 2005, September 5-7, 2005, Fairmont Banff Springs Hotel,
                  Banff, Alberta, Canada},
  pages        = {119--124},
  publisher    = {Knowledge Systems Institute},
  year         = {2005},
  timestamp    = {Tue, 12 Jun 2007 15:50:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dms/SongKYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dms/SongKY05,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  editor       = {Angela Guercio and
                  Timothy Arndt},
  title        = {Agent-based Transactions for Home Energy Services},
  booktitle    = {Proceedings of the 11th International Conference on Distributed Multimedia
                  Systems, {DMS} 2005, September 5-7, 2005, Fairmont Banff Springs Hotel,
                  Banff, Alberta, Canada},
  pages        = {367--372},
  publisher    = {Knowledge Systems Institute},
  year         = {2005},
  timestamp    = {Tue, 12 Jun 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dms/SongKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/ChenHSYK05,
  author       = {Ying{-}Chieh Chen and
                  Jing{-}Jang Hwang and
                  Ronggong Song and
                  George Yee and
                  Larry Korba},
  title        = {Online Gaming Cheating and Security Issue},
  booktitle    = {International Symposium on Information Technology: Coding and Computing
                  {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages        = {518--523},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITCC.2005.215},
  doi          = {10.1109/ITCC.2005.215},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/ChenHSYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/SongKY05,
  author       = {Ronggong Song and
                  Larry Korba and
                  George Yee},
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc
                  networks},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102219.1102226},
  doi          = {10.1145/1102219.1102226},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/SongKY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/SongK04,
  author       = {Ronggong Song and
                  Larry Korba},
  editor       = {Bidyut Gupta},
  title        = {Scalability of Agent-Based Onion Routing Network},
  booktitle    = {19th International Conference on Computers and Their Applications,
                  {CATA} 2004, March 18-20, 2004, Red Lion Hotel on Fifth Avenue, Seattle,
                  Washington, {USA}},
  pages        = {65--69},
  publisher    = {{ISCA}},
  year         = {2004},
  timestamp    = {Mon, 09 Aug 2021 16:27:20 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/SongK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/SongK04,
  author       = {Ronggong Song and
                  Larry Korba},
  title        = {How to Make E-cash with Non-Repudiation and Anonymity},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {167--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286625},
  doi          = {10.1109/ITCC.2004.1286625},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/SongK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/KorbaS04,
  author       = {Larry Korba and
                  Ronggong Song},
  editor       = {Ahmed Karmouch and
                  Larry Korba and
                  Edmundo Roberto Mauro Madeira},
  title        = {Scalability, Security Technologies and Mobile Applications},
  booktitle    = {Mobility Aware Technologies and Applications, First International
                  Workshop,MATA 2004, Florian{\'{o}}polis, Brazil, October 20-22,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3284},
  pages        = {217--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30178-3\_20},
  doi          = {10.1007/978-3-540-30178-3\_20},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/mata/KorbaS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ChenCSK04,
  author       = {Ying{-}Chieh Chen and
                  Patrick S. Chen and
                  Ronggong Song and
                  Larry Korba},
  title        = {Online Gaming Crime and Security Issue - Cases and Countermeasures
                  from Taiwan},
  booktitle    = {Second Annual Conference on Privacy, Security and Trust, October 13-15,
                  2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick,
                  Canada, Proceedings},
  pages        = {131--136},
  year         = {2004},
  url          = {http://dev.hil.unb.ca/Texts/PST/pdf/chen.pdf},
  timestamp    = {Tue, 07 Mar 2006 13:49:03 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/ChenCSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/SongK03,
  author       = {Ronggong Song and
                  Larry Korba},
  title        = {Cryptanalysis of scalable multicast security protocol},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {7},
  number       = {11},
  pages        = {561--563},
  year         = {2003},
  url          = {https://doi.org/10.1109/LCOMM.2003.820094},
  doi          = {10.1109/LCOMM.2003.820094},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/SongK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SongK03,
  author       = {Ronggong Song and
                  Larry Korba},
  title        = {Pay-TV system with strong privacy and non-repudiation protection},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {49},
  number       = {2},
  pages        = {408--413},
  year         = {2003},
  url          = {https://doi.org/10.1109/TCE.2003.1209533},
  doi          = {10.1109/TCE.2003.1209533},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SongK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/El-KhatibKSY03,
  author       = {Khalil El{-}Khatib and
                  Larry Korba and
                  Ronggong Song and
                  George Yee},
  title        = {Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks},
  booktitle    = {32nd International Conference on Parallel Processing Workshops {(ICPP}
                  2003 Workshops), 6-9 October 2003, Kaohsiung, Taiwan},
  pages        = {359--366},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICPPW.2003.1240390},
  doi          = {10.1109/ICPPW.2003.1240390},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/El-KhatibKSY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/SongK02,
  author       = {Ronggong Song and
                  Larry Korba},
  editor       = {Lyman Chapin},
  title        = {Anonymous Internet Communication Based on IPSec},
  booktitle    = {Communication Systems: The State of the Art, {IFIP} 17\({}^{\mbox{th}}\)
                  World Computer Congress - {TC6} Stream on Communication Systems: The
                  State of the Art, August 25-30, 2002, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {220},
  pages        = {199--214},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 14 Aug 2002 09:23:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip/SongK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mata/KorbaSY02,
  author       = {Larry Korba and
                  Ronggong Song and
                  George Yee},
  editor       = {Ahmed Karmouch and
                  Thomas Magedanz and
                  Jaime Delgado},
  title        = {Anonymous Communications for Mobile Agents},
  booktitle    = {Mobile Agents for Telecommunication Applications, 4th International
                  Workshop, {MATA} 2002 Barcelona, Spain, October 23-24, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2521},
  pages        = {171--181},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36086-7\_16},
  doi          = {10.1007/3-540-36086-7\_16},
  timestamp    = {Thu, 14 Oct 2021 09:52:31 +0200},
  biburl       = {https://dblp.org/rec/conf/mata/KorbaSY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/SongL01,
  author       = {Ronggong Song and
                  Michael R. Lyu},
  title        = {Analysis of privacy and non-repudiation on pay-TV systems},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {47},
  number       = {4},
  pages        = {729--733},
  year         = {2001},
  url          = {https://doi.org/10.1109/30.982783},
  doi          = {10.1109/30.982783},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/SongL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics