Results 121-140 of 147.
Bookmark and Share    
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Zhiyuan UL; Pang, Jun UL; Zhang, Chenyi UL

in Proceedings of the 3rd Workshop on Harnessing Theories for Tool Support in Software (2011), ENTCS 274

Detailed reference viewed: 91 (4 UL)
Full Text
Peer Reviewed
See detailAn inductive approach to provable anonymity
Li, Yongjian; Pang, Jun UL

in Proc. 6th International Conference on Availability, Reliability and Security (2011)

Detailed reference viewed: 97 (1 UL)
Full Text
Peer Reviewed
See detailSelective location blinding using hash chains
Lenzini, Gabriele UL; Mauw, Sjouke UL; Pang, Jun UL

in Proc. 19th International Workshop on Security Protocols (2011)

Detailed reference viewed: 145 (6 UL)
Full Text
Peer Reviewed
See detailAnalysis of a receipt-free auction protocol in the applied pi calculus
Dong, Naipeng UL; Jonker, Hugo UL; Pang, Jun UL

in Proc. 7th Workshop on Formal Aspects in Security and Trust (2011)

Detailed reference viewed: 63 (3 UL)
Full Text
Peer Reviewed
See detailVerification of a key-chain based TTP transparent CEM protocol
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (2011)

Detailed reference viewed: 49 (2 UL)
Full Text
Peer Reviewed
See detailA trust-augmented voting scheme for collaborative privacy management
Sun, Yanjie UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proc. 6th International Workshop on Security and Trust Management (2011)

Detailed reference viewed: 116 (1 UL)
Full Text
Peer Reviewed
See detailFast leader election in anonymous rings with bounded expected delay
Bakhshi, R.; Endrullis, Joerg; Fokkink, Wan et al

in Information Processing Letters (2011), 111(17), 864-870

Detailed reference viewed: 84 (2 UL)
Full Text
Peer Reviewed
See detailA study of the PDGF signaling pathway with PRISM
Yuan, Qixia UL; Pang, Jun UL; Mauw, Sjouke UL et al

in Proceedings of the 3rd Workshop on Computational Models for Cell Processes (2011), EPTCS 67

Detailed reference viewed: 140 (13 UL)
Full Text
Peer Reviewed
See detailOn combining state space reductions with global fairness assumptions
Zhang, Shaojie; Sun, Jun; Pang, Jun UL et al

in Proc. 17th International Symposium on Formal Methods (2011)

Detailed reference viewed: 99 (2 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part I the Theor
Li, Yongjian; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 45-55

Detailed reference viewed: 46 (0 UL)
Full Text
Peer Reviewed
See detailModel checking round-based distributed algorithms
An, X.; Pang, Jun UL

in Proc. 15th IEEE International Conference on Engineering of Complex Computer Systems (2010)

Detailed reference viewed: 83 (0 UL)
Full Text
Peer Reviewed
See detailGame-based verification of multi-party contract signing protocols
Zhang, Ying UL; Zhang, Chenyi UL; Pang, Jun UL et al

in Proceedings of 7th International Workshop on Formal Aspects in Security and Trust (FAST'09) (2010)

Detailed reference viewed: 107 (3 UL)
Full Text
Peer Reviewed
See detailExtending the Strand Space Method with Timestamps: Part II Application to Kerberos V
Li, Yongjiang; Pang, Jun UL

in Journal of Information Security (2010), 1(2), 56-67

Detailed reference viewed: 102 (0 UL)
Full Text
Peer Reviewed
See detailOn probabilistic alternating simulations
Zhang, C.; Pang, Jun UL

in Proc. 6th IFIP Conference on Theoretical Computer Science (2010)

Detailed reference viewed: 146 (3 UL)
Full Text
Peer Reviewed
See detailExtending a key-chain based certified email protocol with transparent TTP
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proc. 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

Detailed reference viewed: 99 (0 UL)
Full Text
Peer Reviewed
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J. et al

in Proc. 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Detailed reference viewed: 35 (0 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 99 (4 UL)
Full Text
See detailMessage from T4CIA workshop co-chairs
Pang, Jun UL; Tang, Bao

in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

This is an editorial.

Detailed reference viewed: 77 (1 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 97 (2 UL)
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 112 (2 UL)