Profil

DONG Naipeng

Main Referenced Co-authors
JONKER, Hugo  (4)
PANG, Jun  (4)
Muller, Tim (1)
Main Referenced Keywords
adversary (1); applied pi (1); bribery (1); extortion (1); privacy (1);
Main Referenced Disciplines
Computer science (6)

Publications (total 6)

The most downloaded
208 downloads
Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag. https://hdl.handle.net/10993/213

The most cited

48 citations (Scopus®)

Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag. https://hdl.handle.net/10993/213

Dong, N. (2013). Enforced privacy: from practice to theory [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/16465

Dong, N., Jonker, H., & Pang, J. (2013). Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. In Proceedings of the 18th European Symposium on Research in Computer Security (pp. 499-516). Springer.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2012). Formal analysis of privacy in an eHealth protocol. In Proc. 17th European Symposium on Research in Computer Security (pp. 325-342). Springer-Verlag.
Peer reviewed

Dong, N., Jonker, H., & Pang, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag.
Peer reviewed

Dong, N., & Muller, T. (14 June 2011). A foul adversary: bribery, extortion and blackmail (Abstract) [Paper presentation]. Joint Symposion on Security & Intelligent Information Systems, Warsaw, Poland.

Dong, N., Jonker, H., & Pang, J. (2011). Analysis of a receipt-free auction protocol in the applied pi calculus. In Proc. 7th Workshop on Formal Aspects in Security and Trust (pp. 223–238). Springer-Verlag.
Peer reviewed

Contact ORBilu