Results 81-100 of 133.
Bookmark and Share    
Full Text
See detailMessage from ESSS 2013 Workshop Co-chairs
Pang, Jun UL; Liu, Yang; Mauw, Sjouke UL

in 6th IEEE International Conference on Software Testing, Verification and Validation Workshops Proceedings (2013)

Detailed reference viewed: 95 (1 UL)
Full Text
Peer Reviewed
See detailA balancing act: Parameter estimation for biological models with steady-state measurements
Mizera, Andrzej UL; Pang, Jun UL; Sauter, Thomas UL et al

in Proceedings of 11th Conference on Computational Methods in Systems Biology (CMSB'13) (2013)

Detailed reference viewed: 82 (8 UL)
Full Text
Peer Reviewed
See detailSpecial issue: software verification and testing
Mousavi, Mohammad Reza; Pang, Jun UL

in Innovations in Systems and Software Engineering (2013), 9(2), 57-58

Detailed reference viewed: 106 (1 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to strand spaces
Li, Yongjian; Pang, Jun UL

in Formal Aspects of Computing (2013), 25(4), 465-501

Detailed reference viewed: 95 (0 UL)
Full Text
Peer Reviewed
See detailConstructing and comparing user mobility profiles for location-based services
Chen, Xihui UL; Pang, Jun UL; Xue, Ran

in Proc. 28th ACM Symposium on Applied Computing (2013)

Detailed reference viewed: 98 (4 UL)
Full Text
Peer Reviewed
See detailEnforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proceedings of the 18th European Symposium on Research in Computer Security (2013)

Detailed reference viewed: 73 (2 UL)
Full Text
Peer Reviewed
See detailPrivacy and verifiability in voting systems: Methods, developments and trends
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Computer Science Review (2013)

Detailed reference viewed: 123 (0 UL)
Full Text
Peer Reviewed
See detailDesign and formal verification of a certified email protocol with transparent TTP
Liu, Zhiyuan; Pang, Jun UL; Zhang, Chenyi UL

in Frontiers of Computer Science (2013), 7(2), 279-297

In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy ... [more ▼]

In certified email (CEM) protocols, trusted third party (TTP) transparency is an important security requirement which helps to avoid bad publicity as well as protecting individual users’ privacy. Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the TTP. We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An implementation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satisfying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended protocol. The properties of fairness, timeliness and effectiveness are checked in the model checker Mocha, and TTP transparency is formalised and analysed using the toolsets mCRL and CADP [less ▲]

Detailed reference viewed: 101 (3 UL)
Full Text
Peer Reviewed
See detailDesign and formal analysis of a group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (2013), 4(1), 55-75

Detailed reference viewed: 93 (13 UL)
Full Text
Peer Reviewed
See detailPost-hoc analysis of user traceability in electronic toll collection systems
Chen, Xihui UL; Fonkwe, David; Pang, Jun UL

in Proc. 7th International Workshop on Data Privacy Management (2013)

Detailed reference viewed: 77 (6 UL)
Full Text
Peer Reviewed
See detailLocation Assurance and Privacy in GNSS Navigation
Chen, Xihui; Harpes, Carlo; Lenzini, Gabriele UL et al

in ERCIM News (2013), 2013(94),

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a ... [more ▼]

The growing popularity of location-based services such as GNSS (Global Navigation Satellite System) navigation requires confidence in the reliability of the calculated locations. The exploration of a user’s location also gives rise to severe privacy concerns. Within an ESA (European Space Agency) funded project, we have developed a service that not only verifies the correctness of users’ locations but also enables users to control the accuracy of their revealed locations. [less ▲]

Detailed reference viewed: 79 (7 UL)
Full Text
Peer Reviewed
See detailA trust framework for evaluating GNSS signal integrity
Chen, Xihui UL; Lenzini, Gabriele UL; Martins, Miguel et al

in Proceedings of 26th IEEE Computer Security Foundations Symposium (CSF'13) (2013)

Detailed reference viewed: 255 (5 UL)
Full Text
Peer Reviewed
See detailVerification of functional and non-functional requirements of web service composition
Chen, Manman; Tan, Tian Huat; Sun, Jun et al

in Proceedings of 15th Conference on Formal Engineering Methods (ICFEM'13) (2013)

Detailed reference viewed: 93 (0 UL)
Full Text
Peer Reviewed
See detailAn Algorithm for Probabilistic Alternating Simulation
Zhang, Chenyi UL; Pang, Jun UL

in Proc. 38th International Conference on Current Trends in Theory and Practice of Computer Science (2012)

Detailed reference viewed: 80 (5 UL)
Full Text
Peer Reviewed
See detailMeasuring query privacy in location-based services
Chen, Xihui UL; Pang, Jun UL

in Proc. 2nd ACM Conference on Data and Application Security and Privacy (2012)

The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information ... [more ▼]

The popularity of location-based services leads to serious concerns on user privacy. A common mechanism to protect users’ location and query privacy is spatial generalisation. As more user information becomes available with the fast growth of Internet applications, e.g., social networks, attackers have the ability to construct users’ personal profiles. This gives rise to new challenges and reconsideration of the existing privacy metrics, such as k-anonymity. In this paper, we propose new metrics to measure users’ query privacy taking into account user profiles. Furthermore, we design spatial generalisation algorithms to compute regions satisfying users’ privacy requirements expressed in these metrics. By experimental results, our metrics and algorithms are shown to be effective and efficient for practical usage. [less ▲]

Detailed reference viewed: 74 (3 UL)
Full Text
See detailLocation-Based Services: Privacy, Security and Assurance
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Digital Enlightenment Yearbook 2012 (2012)

Detailed reference viewed: 79 (5 UL)
Full Text
See detailEditorial message: Special track on software verification and testing
Pang, Jun UL; Mousavi, Mohammad Reza

in Proc. 27th Symposium on Applied Computing (2012)

Detailed reference viewed: 35 (3 UL)
Full Text
Peer Reviewed
See detailChallenges in eHealth: from enabling to enforcing privacy
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (2012)

Detailed reference viewed: 87 (2 UL)
Full Text
Peer Reviewed
See detailGame-based verification of contract signing protocols with minimal messages
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Innovations in Systems and Software Engineering (2012), 8

Detailed reference viewed: 92 (3 UL)
Full Text
Peer Reviewed
See detailA group signature based electronic toll pricing system
Chen, Xihui UL; Lenzini, Gabriele UL; Mauw, Sjouke UL et al

in Proc. 7th International Conference on Availability, Reliability and Security (2012)

Detailed reference viewed: 101 (2 UL)