References of "Pang, Jun 50002807"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailAn inductive approach to strand spaces
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2013), 25(4), 465-501

Detailed reference viewed: 104 (0 UL)
Full Text
Peer Reviewed
See detailSpecial issue: software verification and testing
Mousavi, Mohammad Reza; Pang, Jun UL

in Innovations in Systems and Software Engineering (2013), 9(2), 57-58

Detailed reference viewed: 118 (1 UL)
Full Text
Peer Reviewed
See detailA balancing act: Parameter estimation for biological models with steady-state measurements
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

Detailed reference viewed: 87 (8 UL)
Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Detailed reference viewed: 104 (1 UL)
Full Text
See detailMathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 4th Workshop on Computational Models for Cell Processes (CompMod'13) (2013)

Detailed reference viewed: 96 (10 UL)
Full Text
Peer Reviewed
See detailFormal analysis of privacy in an eHealth protocol
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 17th European Symposium on Research in Computer Security (2012)

Detailed reference viewed: 85 (6 UL)
Full Text
Peer Reviewed
See detailMeasuring query privacy in location-based services
Chen, Xihui UL; Pang, Jun UL

in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012)

The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information ... [more ▼]

The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information becomes available with the fast growth of Internet applications, e.g., social networks, attackers have the ability to construct users’ personal profiles. This gives rise to new challenges and reconsideration of the existing privacy metrics, such as k-anonymity. In this paper, we propose new metrics to measure users’ query privacy taking into account user profiles. Furthermore, we design spatial generalisation algorithms to compute regions satisfying users’ privacy requirements expressed in these metrics. By experimental results, our metrics and algorithms are shown to be effective and efficient for practical usage. [less ▲]

Detailed reference viewed: 87 (3 UL)
Full Text
Peer Reviewed
See detailComparative analysis of clustering protocols with probabilistic model checking
Li, Qian UL; Schaffer, Peter UL; Pang, Jun UL et al

in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

Detailed reference viewed: 113 (3 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 95 (6 UL)
Full Text
See detailLocation-Based Services: Privacy, Security and Assurance
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Digital Enlightenment Yearbook 2012 (2012)

Detailed reference viewed: 81 (5 UL)
Full Text
Peer Reviewed
See detailAn Algorithm for Probabilistic Alternating Simulation
Zhang, Chenyi UL; Pang, Jun UL

in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)

Detailed reference viewed: 88 (5 UL)
Full Text
Peer Reviewed
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based services are at risk.This paper describes a solution to mitigate this risk. It is a trusted third-party Localisation Assurance service that informs location-based services providers up to which level a location claimed by client can be trusted. It runs several tests over the localisation data of client receivers and certifies the level of assurance of locations. An assurance level expresses the amount of trust the third-party has that a receiver's location is calculated from integral and authentic satellite signals. [less ▲]

Detailed reference viewed: 173 (6 UL)
Full Text
Peer Reviewed
See detailChallenges in eHealth: from enabling to enforcing privacy
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)

Detailed reference viewed: 97 (2 UL)
Full Text
Peer Reviewed
See detailGame-based verification of contract signing protocols with minimal messages
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Innovations in Systems and Software Engineering (2012), 8

Detailed reference viewed: 101 (3 UL)
Full Text
See detailEditorial message: Special track on software verification and testing
Pang, Jun UL; Mousavi, Mohammad Reza

in Proc. 27th Symposium on Applied Computing (2012)

Detailed reference viewed: 37 (3 UL)
Full Text
Peer Reviewed
See detailProbabilistic model checking of the PDGF signaling pathway
Yuan, Qixia UL; Trairatphisan, Panuwat UL; Pang, Jun UL et al

in Transactions on Computational Systems Biology (2012), XIV

Detailed reference viewed: 146 (16 UL)
Full Text
Peer Reviewed
See detailA group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

Detailed reference viewed: 116 (2 UL)
Full Text
Peer Reviewed
See detailOn combining state space reductions with global fairness assumptions
Zhang, Shaojie; Sun, Jun; Pang, Jun UL et al

in Proc. 17th International Symposium on Formal Methods (2011)

Detailed reference viewed: 98 (2 UL)
Full Text
Peer Reviewed
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia UL; Pang, Jun UL; Mauw, Sjouke UL et al

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Detailed reference viewed: 140 (13 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 144 (6 UL)