DONG, N. (2013). Enforced privacy: from practice to theory [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/16465 |
DONG, N., JONKER, H., & PANG, J. (2013). Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations. In Proceedings of the 18th European Symposium on Research in Computer Security (pp. 499-516). Springer. Peer reviewed |
DONG, N., JONKER, H., & PANG, J. (2012). Formal analysis of privacy in an eHealth protocol. In Proc. 17th European Symposium on Research in Computer Security (pp. 325-342). Springer-Verlag. Peer reviewed |
DONG, N., JONKER, H., & PANG, J. (2012). Challenges in eHealth: from enabling to enforcing privacy. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (pp. 195-206). Springer-Verlag. Peer reviewed |
DONG, N., & Muller, T. (14 June 2011). A foul adversary: bribery, extortion and blackmail (Abstract) [Paper presentation]. Joint Symposion on Security & Intelligent Information Systems, Warsaw, Poland. |
DONG, N., JONKER, H., & PANG, J. (2011). Analysis of a receipt-free auction protocol in the applied pi calculus. In Proc. 7th Workshop on Formal Aspects in Security and Trust (pp. 223–238). Springer-Verlag. Peer reviewed |