References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Zhiyuan UL; Pang, Jun UL; Zhang, Chenyi UL

in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

Detailed reference viewed: 110 (4 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 173 (7 UL)
Full Text
Peer Reviewed
See detailBulletin boards in voting systems: Modelling and measuring privacy
Jonker, Hugo UL; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 135 (1 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 111 (1 UL)
Full Text
Peer Reviewed
See detailExtending a key-chain based certified email protocol with transparent TTP
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

Detailed reference viewed: 133 (1 UL)
Full Text
Peer Reviewed
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun UL

in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Detailed reference viewed: 99 (1 UL)
Full Text
Peer Reviewed
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J. et al

in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Detailed reference viewed: 49 (1 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 56-67

Detailed reference viewed: 119 (0 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 62 (0 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 125 (3 UL)
Full Text
Peer Reviewed
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun UL

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Detailed reference viewed: 158 (3 UL)
Full Text
Peer Reviewed
See detailPAT: Towards flexible verification under fairness
Sun, J.; Liu, Y.; Dong, J.-S. et al

in Proc. 21th International Conference on Computer Aided Verification (2009)

Detailed reference viewed: 206 (1 UL)
Full Text
See detailMessage from T4CIA workshop co-chairs
Pang, Jun UL; Tang, Bao

in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

This is an editorial.

Detailed reference viewed: 92 (1 UL)
Full Text
Peer Reviewed
See detailVerification of population ring protocols in PAT
Liu, Y.; Pang, Jun UL; Sun, J. et al

in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

Detailed reference viewed: 127 (2 UL)
Full Text
Peer Reviewed
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun UL; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Detailed reference viewed: 132 (1 UL)
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 130 (2 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 114 (2 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 115 (7 UL)
Full Text
Peer Reviewed
See detailLeader election in anonymous rings: Franklin goes probabilistic
Bakhshi, R.; Fokkink, W. J.; Pang, Jun UL et al

in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

Detailed reference viewed: 106 (2 UL)
Full Text
Peer Reviewed
See detailIs timed branching bisimilarity a congruence indeed?
Fokkink, W. J.; Pang, Jun UL; Wijs, A. J.

in Fundamenta Informaticae (2008), 87(3-4), 287311

Detailed reference viewed: 50 (1 UL)