Jun Pang
Zitiert von
Zitiert von
PAT: Towards flexible verification under fairness
J Sun, Y Liu, J Dong, J Pang
21st International Conference on Computer Aided Verification, 709-714, 2009
Recent development and biomedical applications of probabilistic Boolean networks
P Trairatphisan, A Mizera, J Pang, AA Tantar, J Schneider, T Sauter
Cell communication and signaling 11 (1), 1-25, 2013
Metrics for action-labelled quantitative transition systems
Y Deng, T Chothia, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 153 (2), 79-96, 2006
walk2friends: Inferring social links from mobility profiles
M Backes, M Humbert, J Pang, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Measuring anonymity with relative entropy
Y Deng, J Pang, P Wu
Proceedings of 4th Workshop on Formal Aspects in Security and Trust (FAST'06 …, 2007
A new access control scheme for Facebook-style social networks
J Pang, Y Zhang
Computers & Security 54, 44-59, 2015
Privacy and verifiability in voting systems: Methods, developments and trends
H Jonker, S Mauw, J Pang
Computer Science Review 10, 1-30, 2013
Challenges in ehealth: From enabling to enforcing privacy
N Dong, H Jonker, J Pang
International Symposium on Foundations of Health Informatics Engineering and …, 2011
Analysis of a Distributed System for Lifting Trucks
JF Groote, J Pang, AG Wouters
Journal of Logic and Algebraic Programming 55 (1-2), 21-56, 2003
Constructing and Comparing User Mobility Profiles for Location-based Services
X Chen, J Pang, R Xue
28th ACM Symposium on Applied Computing, 2013
Exact state set representations in the verification of linear hybrid systems with large discrete state space
W Damm, S Disch, H Hungar, S Jacobs, J Pang, F Pigorsch, C Scholl, ...
International Symposium on Automated Technology for Verification and …, 2007
Verification of a sliding window protocol in μCRL and PVS
B Badban, W Fokkink, JF Groote, J Pang, J Pol
Formal Aspects of Computing 17 (3), 342-388, 2005
Measuring query privacy in location-based services
X Chen, J Pang
Proceedings of the second ACM conference on Data and Application Security …, 2012
Cones and foci: A mechanical framework for protocol verification
W Fokkink, J Pang, J Van De Pol
Formal Methods in System Design 29 (1), 1-31, 2006
Model checking a cache coherence protocol of a Java DSM implementation
J Pang, W Fokkink, R Hofman, R Veldema
The Journal of Logic and Algebraic Programming 71 (1), 1-43, 2007
Verifying a sliding window protocol in μCRL
W Fokkink, JF Groote, J Pang, B Badban, J van de Pol
Proc. 10th Conference on Algebraic Methodology and Software Technology …, 2004
A framework for automatically checking anonymity with μCRL
T Chothia, S Orzan, J Pang, MT Dashti
Proc. 2nd Symposium on Trustworthy Global Computing (TGC'06), 301-318, 2007
Constructing and comparing user mobility profiles
X Chen, J Pang, R Xue
ACM Transactions on the Web (TWEB) 8 (4), 1-25, 2014
Compositional reasoning for probabilistic finite-state behaviors
Y Deng, C Palamidessi, J Pang
Processes, Terms and Cycles: Steps on the Road to Infinity: Essays Dedicated …, 2005
Weak probabilistic anonymity
Y Deng, C Palamidessi, J Pang
Electronic Notes in Theoretical Computer Science 180 (1), 55-76, 2007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20