Profil

ZHANG Chenyi

Main Referenced Co-authors
PANG, Jun  (7)
MAUW, Sjouke  (4)
ALCALDE, Baptiste  (2)
SUN, Yanjie  (2)
ZHANG, Ying  (2)
Main Referenced Keywords
Comparison (1); Computer security (1); formal verification (1); Information flow (1); Noninterference (1);
Main Referenced Disciplines
Computer science (8)
Engineering, computing & technology: Multidisciplinary, general & others (1)

Publications (total 8)

The most downloaded
123 downloads
ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9 https://hdl.handle.net/10993/216

The most cited

26 citations (OpenAlex)

van der Meyden, R., & ZHANG, C. (19 August 2010). A Comparison of Semantic Models for Noninterference. Theoretical Computer Science, 411 (47), 4123–4147. doi:10.1016/j.tcs.2010.08.013 https://hdl.handle.net/10993/16036

Liu, Z., PANG, J., & ZHANG, C. (2013). Design and formal verification of a certified email protocol with transparent TTP. Frontiers of Computer Science, 7 (2), 279-297. doi:10.1007/s11704-013-1268-6
Peer reviewed

SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2012). A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20 (4), 437-459. doi:10.3233/JCS-2012-0453
Peer Reviewed verified by ORBi

ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9
Peer reviewed

ZHANG, C., & PANG, J. (2012). An Algorithm for Probabilistic Alternating Simulation. In Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (pp. 431-442).
Peer reviewed

SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2011). A trust-augmented voting scheme for collaborative privacy management. In Proc. 6th International Workshop on Security and Trust Management (pp. 132-146).
Peer reviewed

LIU, Z., PANG, J., & ZHANG, C. (2011). Verification of a key-chain based TTP transparent CEM protocol. Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software, ENTCS 274, 51-65.
Peer reviewed

van der Meyden, R., & ZHANG, C. (19 August 2010). A Comparison of Semantic Models for Noninterference. Theoretical Computer Science, 411 (47), 4123–4147. doi:10.1016/j.tcs.2010.08.013
Peer Reviewed verified by ORBi

ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2010). Game-based verification of multi-party contract signing protocols. In Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (pp. 186-200). Springer-Verlag.
Peer reviewed

Contact ORBilu