Hu, H., & Gong, G. (2009). New sequence families with zero or low correlation zone via interleaving techniques Seoul, Korea.
Reference author: Guang Gong
First name
Guang
Last name
Gong
Wen, H., Ho, P. H., & Gong, G. (2009). A Novel Framework for Message Authentication in Vehicular Communication Networks
Li, Z., & Gong, G. (2009). Randomly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks Macau SAR, P.R.C.
Yu, N. Y., & Gong, G. (2006). Cross correlation properties of binary sequences with ideal two-level autocorrelation Sequences and Their Applications (SETA06), LNCS, 4086, 104-118.
Hoeper, K., & Gong, G. (2006). Integrated DH-like key exchange protocols from LUC, GH and XTR Proceedings of International Symposium on Information Theory(ISIT 2006).
Hoeper, K., & Gong, G. (2006). Key revocation for identity-based schemes in mobile ad hoc networks Proceedings of 5th International Conference on AD-HOC Networks and Wireless -AD HOCNOW, Lecture Notes in Computer Science, 4104, 224-237.
Li, Z., & Gong, G. (2009). Computationally Efficient Mutual Entity Authentication in Wireless Sensor Networks Niagara Falls, Ontario, Canada.
Wen, H., & Gong, G. (2009). A cross-layer approach to enhance the security of wireless networks based on MIMO (Original work published 2009)
Li, Z., & Gong, G. (2009). DHT-Based Detection of Node Clone in Wireless Sensor Networks Niagara Falls, Ontario, Canada.
Fu, S., Luo, G., & Gong, G. (2021). Batching Anonymous and Non-Anonymous Membership Proofs for Blockchain Applications Virtual Conference, 10th - 13th May. https://doi.org/DOI:10.1109/AIIoT52608.2021.9454223.
- Previous page
- Currently on page 3 3
- Next page