![]() ; Pang, Jun ![]() in ACM Transactions on the Web (2014), 8(4), 21 Detailed reference viewed: 119 (1 UL)![]() Chen, Xihui ![]() ![]() in Proceedings of 20th ACM Conference on Computer and Communications Security (CCS'13) (2013, November) Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we ... [more ▼] Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS satellite without having been artificially interfered with. Our prototype provides interfaces that can incorporate existing spoofing detection methods whose results are then combined into an overall evaluation of the signal’s integrity, which we call integrity level. Considering the various security requirements from different applications, integrity levels can be calculated in many ways determined by their users. We also present an application scenario that deploys our prototype and offers a public central service – localisation assurance certification. Through experiments, we successfully show that our prototype is not only effective but also efficient in practice. [less ▲] Detailed reference viewed: 344 (14 UL)![]() Trairatphisan, Panuwat ![]() ![]() ![]() in Cell Communication and Signaling (2013), 11(46), Probabilistic Boolean network (PBN) modelling is a semi-quantitative approach widely used for the study of the topology and dynamic aspects of biological systems. The combined use of rule-based ... [more ▼] Probabilistic Boolean network (PBN) modelling is a semi-quantitative approach widely used for the study of the topology and dynamic aspects of biological systems. The combined use of rule-based representation and probability makes PBN appealing for large-scale modelling of biological networks where degrees of uncertainty need to be considered. A considerable expansion of our knowledge in the field of theoretical research on PBN can be observed over the past few years, with a focus on network inference, network intervention and control. With respect to areas of applications, PBN is mainly used for the study of gene regulatory networks though with an increasing emergence in signal transduction, metabolic, and also physiological networks. At the same time, a number of computational tools, facilitating the modelling and analysis of PBNs, are continuously developed. A concise yet comprehensive review of the state-of-the-art on PBN modelling is offered in this article, including a comparative discussion on PBN versus similar models with respect to concepts and biomedical applications. Due to their many advantages, we consider PBN to stand as a suitable modelling framework for the description and analysis of complex biological systems, ranging from molecular to physiological levels. [less ▲] Detailed reference viewed: 313 (32 UL)![]() Dong, Naipeng ![]() ![]() ![]() in Proceedings of the 18th European Symposium on Research in Computer Security (2013) Detailed reference viewed: 113 (2 UL)![]() Mizera, Andrzej ![]() ![]() ![]() in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013) Detailed reference viewed: 120 (8 UL)![]() ; Pang, Jun ![]() in Innovations in Systems and Software Engineering (2013), 9(2), 57-58 Detailed reference viewed: 143 (1 UL)![]() ; Pang, Jun ![]() in Formal Aspects of Computing (2013), 25(4), 465-501 Detailed reference viewed: 130 (0 UL)![]() ; ; Lenzini, Gabriele ![]() in ERCIM News (2013), 2013(94), The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a ... [more ▼] The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a user’s location also gives rise to severe privacy concerns. Within an ESA (European Space Agency) funded project, we have developed a service that not only verifies the correctness of users’ locations but also enables users to control the accuracy of their revealed locations. [less ▲] Detailed reference viewed: 129 (7 UL)![]() Chen, Xihui ![]() ![]() in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013) Detailed reference viewed: 328 (6 UL)![]() Chen, Xihui ![]() ![]() in Proc. 7th International Workshop on Data Privacy Management (2013) Detailed reference viewed: 120 (6 UL)![]() ; ; et al in Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (2013) Detailed reference viewed: 130 (0 UL)![]() Jonker, Hugo ![]() ![]() ![]() in Computer Science Review (2013) Detailed reference viewed: 182 (0 UL)![]() ; Pang, Jun ![]() ![]() in Frontiers of Computer Science (2013), 7(2), 279-297 In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy ... [more ▼] In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the TTP. We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An implementation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satisfying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended protocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP transparency is formalised and analysed using the toolsets mCRL and CADP [less ▲] Detailed reference viewed: 131 (3 UL)![]() Chen, Xihui ![]() ![]() ![]() in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75 Detailed reference viewed: 136 (13 UL)![]() Chen, Xihui ![]() ![]() in Proc. 28th ACM Symposium on Applied Computing (2013) Detailed reference viewed: 138 (4 UL)![]() Chen, Xihui ![]() ![]() in Proc. 3rd ACM Conference on Data and Application Security and Privacy (2013) Detailed reference viewed: 141 (7 UL)![]() Pang, Jun ![]() ![]() in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013) Detailed reference viewed: 134 (1 UL)![]() Pang, Jun ![]() in Proc. 28th Symposium on Applied Computing (2013) Detailed reference viewed: 50 (7 UL)![]() Mizera, Andrzej ![]() ![]() ![]() in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013) Detailed reference viewed: 121 (10 UL)![]() Zhang, Ying ![]() ![]() ![]() in Innovations in Systems and Software Engineering (2012), 8 Detailed reference viewed: 130 (3 UL) |
||