Results 101-120 of 133.
Bookmark and Share    
Full Text
Peer Reviewed
See detailFormal analysis of privacy in an eHealth protocol
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 17th European Symposium on Research in Computer Security (2012)

Detailed reference viewed: 73 (6 UL)
Full Text
Peer Reviewed
See detailComparative analysis of clustering protocols with probabilistic model checking
Li, Qian UL; Schaffer, Peter UL; Pang, Jun UL et al

in Proc. 6th International Symposium on Theoretical Aspects of Software Engineering (2012)

Detailed reference viewed: 105 (3 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Journal of Computer Security (2012), 20(4), 437-459

Detailed reference viewed: 86 (6 UL)
Full Text
Peer Reviewed
See detailProbabilistic model checking of the PDGF signaling pathway
Yuan, Qixia UL; Trairatphisan, Panuwat UL; Pang, Jun UL et al

in Transactions on Computational Systems Biology (2012), XIV

Detailed reference viewed: 137 (16 UL)
Full Text
Peer Reviewed
See detailImplementation and Validation of a Localisation Assurance Service Provider
Chen, Xihui UL; Harpes, Carlo; Lenzini, Gabriele UL et al

in Proc. 6th ESA Workshop on Satellite Navigation Technologies (2012)

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with ... [more ▼]

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based services are at risk.This paper describes a solution to mitigate this risk. It is a trusted third-party Localisation Assurance service that informs location-based services providers up to which level a location claimed by client can be trusted. It runs several tests over the localisation data of client receivers and certifies the level of assurance of locations. An assurance level expresses the amount of trust the third-party has that a receiver's location is calculated from integral and authentic satellite signals. [less ▲]

Detailed reference viewed: 148 (6 UL)
Full Text
Peer Reviewed
See detailBulletin boards in voting systems: Modelling and measuring privacy
Jonker, Hugo UL; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 95 (1 UL)
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Zhiyuan UL; Pang, Jun UL; Zhang, Chenyi UL

in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

Detailed reference viewed: 79 (4 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 130 (6 UL)
Full Text
Peer Reviewed
See detailAnalysis of a receipt-free auction protocol in the applied pi calculus
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

Detailed reference viewed: 58 (3 UL)
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)

Detailed reference viewed: 46 (2 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 101 (1 UL)
Full Text
Peer Reviewed
See detailFast leader election in anonymous rings with bounded expected delay
Bakhshi, R.; Endrullis, Joerg; Fokkink, Wan et al

in Information Processing Letters (2011), 111(17), 864-870

Detailed reference viewed: 77 (2 UL)
Full Text
Peer Reviewed
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia UL; Pang, Jun UL; Mauw, Sjouke UL et al

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Detailed reference viewed: 132 (13 UL)
Full Text
Peer Reviewed
See detailOn combining state space reductions with global fairness assumptions
Zhang, Shaojie; Sun, Jun; Pang, Jun UL et al

in Proc. 17th International Symposium on Formal Methods (2011)

Detailed reference viewed: 87 (2 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 43 (0 UL)
Full Text
Peer Reviewed
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun UL

in Proc. 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Detailed reference viewed: 74 (0 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 90 (3 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 56-67

Detailed reference viewed: 91 (0 UL)
Full Text
Peer Reviewed
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun UL

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Detailed reference viewed: 80 (3 UL)