References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailFast leader election in anonymous rings with bounded expected delay
Bakhshi, R.; Endrullis, Joerg; Fokkink, Wan et al

in Information Processing Letters (2011), 111(17), 864-870

Detailed reference viewed: 101 (2 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 56-67

Detailed reference viewed: 127 (0 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 71 (0 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 133 (3 UL)
Full Text
Peer Reviewed
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun UL

in Proceedings of 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Detailed reference viewed: 105 (1 UL)
Full Text
Peer Reviewed
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun UL

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Detailed reference viewed: 164 (3 UL)
Full Text
Peer Reviewed
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J. et al

in Proceedings of 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Detailed reference viewed: 78 (1 UL)
Full Text
Peer Reviewed
See detailExtending a key-chain based certified email protocol with transparent TTP
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proceedings of 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

Detailed reference viewed: 141 (1 UL)
Full Text
See detailMessage from T4CIA workshop co-chairs
Pang, Jun UL; Tang, Bao

in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

This is an editorial.

Detailed reference viewed: 100 (1 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 121 (7 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 118 (2 UL)
Full Text
Peer Reviewed
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun UL; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Detailed reference viewed: 138 (1 UL)
Full Text
Peer Reviewed
See detailPAT: Towards flexible verification under fairness
Sun, J.; Liu, Y.; Dong, J.-S. et al

in Proc. 21th International Conference on Computer Aided Verification (2009)

Detailed reference viewed: 215 (1 UL)
Full Text
Peer Reviewed
See detailVerification of population ring protocols in PAT
Liu, Y.; Pang, Jun UL; Sun, J. et al

in Proceedings of 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

Detailed reference viewed: 137 (2 UL)
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 137 (2 UL)
Full Text
Peer Reviewed
See detailIs timed branching bisimilarity a congruence indeed?
Fokkink, W. J.; Pang, Jun UL; Wijs, A. J.

in Fundamenta Informaticae (2008), 87(3-4), 287311

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Zhengqin; Deng, Yuxin

in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)

Detailed reference viewed: 117 (5 UL)
Full Text
Peer Reviewed
See detailLeader election in anonymous rings: Franklin goes probabilistic
Bakhshi, R.; Fokkink, W. J.; Pang, Jun UL et al

in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

Detailed reference viewed: 113 (2 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Z.; Deng, Y.

in Frontiers of Computer Science in China (2008), 2(4), 357367

Detailed reference viewed: 142 (2 UL)