Results 121-133 of 133.
Bookmark and Share    
Full Text
Peer Reviewed
See detailExtending a key-chain based certified email protocol with transparent TTP
Liu, Z.; Pang, Jun UL; Zhang, C.

in Proc. 6th IEEE/IFIP Symposium on Trusted Computing and Communications (2010)

Detailed reference viewed: 85 (0 UL)
Full Text
Peer Reviewed
See detailBrief announcement: Asynchronous bounded expected delay networks
Bakhshi, R.; Endrullis, Joerg; Fokkink, W. J. et al

in Proc. 29th Annual ACM Symposium on Principles of Distributed Computing (2010)

Detailed reference viewed: 32 (0 UL)
Full Text
Peer Reviewed
See detailA formal framework for quantifying voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Journal of Algorithms in Cognition, Informatics and Logic (2009)

Detailed reference viewed: 83 (4 UL)
Full Text
See detailMessage from T4CIA workshop co-chairs
Pang, Jun UL; Tang, Bao

in Proc. 3rd IEEE Conference on Secure Software Integration and Reliability Improvement (2009)

This is an editorial.

Detailed reference viewed: 69 (1 UL)
Full Text
Peer Reviewed
See detailMeasuring voter-controlled privacy
Jonker, Hugo UL; Mauw, Sjouke UL; Pang, Jun UL

in Proceedings of 4th Conference on Availability, Reliability and Security (ARES'09) (2009)

Detailed reference viewed: 86 (2 UL)
Full Text
Peer Reviewed
See detailImproving automatic verification of security protocols with XOR
Chen, Xihui UL; van Deursen, Ton UL; Pang, Jun UL

in Proc. 11th International Conference on Formal Engineering Methods (2009)

Detailed reference viewed: 101 (2 UL)
Full Text
Peer Reviewed
See detailHow to work with honest but curious judges? (preliminary report)
Pang, Jun UL; Zhang, C.

in Proc. 7th International Workshop on Security Issues in Concurrency (2009)

Detailed reference viewed: 111 (1 UL)
Full Text
Peer Reviewed
See detailVerification of population ring protocols in PAT
Liu, Y.; Pang, Jun UL; Sun, J. et al

in Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering (2009)

Detailed reference viewed: 93 (1 UL)
Full Text
Peer Reviewed
See detailPAT: Towards flexible verification under fairness
Sun, J.; Liu, Y.; Dong, J.-S. et al

in Proc. 21th International Conference on Computer Aided Verification (2009)

Detailed reference viewed: 183 (1 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Zhengqin; Deng, Yuxin

in Proceedings of 2nd IEEE Symposium on Theoretical Aspects of Software Engineering (TASE'08) (2008)

Detailed reference viewed: 78 (5 UL)
Full Text
Peer Reviewed
See detailOn automatic verification of self-stabilizing population protocols
Pang, Jun UL; Luo, Z.; Deng, Y.

in Frontiers of Computer Science in China (2008), 2(4), 357367

Detailed reference viewed: 97 (1 UL)
Full Text
Peer Reviewed
See detailIs timed branching bisimilarity a congruence indeed?
Fokkink, W. J.; Pang, Jun UL; Wijs, A. J.

in Fundamenta Informaticae (2008), 87(3-4), 287311

Detailed reference viewed: 39 (1 UL)
Full Text
Peer Reviewed
See detailLeader election in anonymous rings: Franklin goes probabilistic
Bakhshi, R.; Fokkink, W. J.; Pang, Jun UL et al

in Proc. 5th IFIP Conference on Theoretical Computer Science (2008)

Detailed reference viewed: 79 (2 UL)