References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based services are at risk.This paper describes a solution to mitigate this risk. It is a trusted third-party Localisation Assurance service that informs location-based services providers up to which level a location claimed by client can be trusted. It runs several tests over the localisation data of client receivers and certifies the level of assurance of locations. An assurance level expresses the amount of trust the third-party has that a receiver's location is calculated from integral and authentic satellite signals. [less ▲]

Detailed reference viewed: 147 (6 UL)
Full Text
Peer Reviewed
See detailA group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

Detailed reference viewed: 100 (2 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 85 (6 UL)
Full Text
Peer Reviewed
See detailAn Algorithm for Probabilistic Alternating Simulation
Zhang, Chenyi UL; Pang, Jun UL

in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)

Detailed reference viewed: 79 (5 UL)
Full Text
Peer Reviewed
See detailFormal analysis of privacy in an eHealth protocol
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 17th European Symposium on Research in Computer Security (2012)

Detailed reference viewed: 73 (6 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 85 (1 UL)
Full Text
Peer Reviewed
See detailBulletin boards in voting systems: Modelling and measuring privacy
Jonker, Hugo UL; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 94 (1 UL)
Full Text
Peer Reviewed
See detailFast leader election in anonymous rings with bounded expected delay
Bakhshi, R.; Endrullis, Joerg; Fokkink, Wan et al

in Information Processing Letters (2011), 111(17), 864-870

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 129 (6 UL)
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Zhiyuan UL; Pang, Jun UL; Zhang, Chenyi UL

in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 100 (1 UL)
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detailOn combining state space reductions with global fairness assumptions
Zhang, Shaojie; Sun, Jun; Pang, Jun UL et al

in Proc. 17th International Symposium on Formal Methods (2011)

Detailed reference viewed: 86 (2 UL)
Full Text
Peer Reviewed
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia UL; Pang, Jun UL; Mauw, Sjouke UL et al

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Detailed reference viewed: 130 (13 UL)
Full Text
Peer Reviewed
See detailAnalysis of a receipt-free auction protocol in the applied pi calculus
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun UL

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Detailed reference viewed: 79 (3 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 89 (3 UL)
Full Text
Peer Reviewed
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun UL

in Proc. 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Detailed reference viewed: 73 (0 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J. et al

in Proc. 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Detailed reference viewed: 32 (0 UL)