Liu, Z., PANG, J., & ZHANG, C. (2013). Design and formal verification of a certified email protocol with transparent TTP. Frontiers of Computer Science, 7 (2), 279-297. doi:10.1007/s11704-013-1268-6 Peer reviewed |
SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2012). A trust-augmented voting scheme for collaborative privacy management. Journal of Computer Security, 20 (4), 437-459. doi:10.3233/JCS-2012-0453 Peer Reviewed verified by ORBi |
ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2012). Game-based verification of contract signing protocols with minimal messages. Innovations in Systems and Software Engineering, 8, 111-124. doi:10.1007/s11334-012-0180-9 Peer reviewed |
ZHANG, C., & PANG, J. (2012). An Algorithm for Probabilistic Alternating Simulation. In Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (pp. 431-442). Peer reviewed |
SUN, Y., ZHANG, C., PANG, J., ALCALDE, B., & MAUW, S. (2011). A trust-augmented voting scheme for collaborative privacy management. In Proc. 6th International Workshop on Security and Trust Management (pp. 132-146). Peer reviewed |
LIU, Z., PANG, J., & ZHANG, C. (2011). Verification of a key-chain based TTP transparent CEM protocol. Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software, ENTCS 274, 51-65. Peer reviewed |
van der Meyden, R., & ZHANG, C. (19 August 2010). A Comparison of Semantic Models for Noninterference. Theoretical Computer Science, 411 (47), 4123–4147. doi:10.1016/j.tcs.2010.08.013 Peer Reviewed verified by ORBi |
ZHANG, Y., ZHANG, C., PANG, J., & MAUW, S. (2010). Game-based verification of multi-party contract signing protocols. In Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (pp. 186-200). Springer-Verlag. Peer reviewed |