Publications

Note: some of the work was published in offical proceedings. For these works the final version can be found at the official publisher's website. In these cases, a preliminary version is supplied below.

Published in 2024

Conference Proceedings

  1. Software-Based Memory Erasure with Relaxed Isolation Requirements. S. Bursuc, R. Gil-Pons, S. Mauw and R. Trujillo-Rasua. In Proc. 37th IEEE Computer Security Foundations Symposium (CSF’24), pp. to appear, 2024. bib ]

Published in 2023

Book Chapters

  1. Software Certification as a Limit on Liability: the Case of Cubesat Operations. M. Crepaldi, R. Horne and S. Mauw. In Space Law in a Networked World, Brill, 2023. bib | URL ]

Edited Proceedings

  1. Proceedings of the 21th International Conference on Computational Methods in Systems Biology. J. Pang and J. Niehren, editors. LNCS 14137, 2023. bib ]

Journal Articles

  1. On the Optimal Resistance against Mafia and Distance Fraud in Distance-Bounding Protocols. R. Gil-Pons, S. Mauw and R. Trujillo-Rasua. Computer Communications, 210:69–78, 2023. bib ]
  2. Multi-grained semantics-aware graph neural networks. Z. Zhong, C.-T. Li and J. Pang. IEEE Transactions on Knowledge and Data Engineering, 35(7):7251-7262, 2023. bib ]
  3. The applicability of transperceptual and deep learning approaches to the study and mimicry of complex cartilaginous tissues. J. Waghorne, C. Howard, H. Hu, J. Pang, W.J. Peveler, L. Harris and O. Barrera. Frontiers in Materials, 10():article 4, 2023. bib ]
  4. Relation-aware weighted embedding for heterogeneous graphs. G. Hu and J. Pang. Information Technology and Control, 52(1):199-214, 2023. bib ]
  5. Target control of asynchronous Boolean Networks. C. Su and J. Pang. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 20(1):707-719, 2023. bib ]
  6. Hierarchical message-passing graph neural networks. Z. Zhong, C.-T. Li and J. Pang. Data Mining and Knowledge Discovery, 37(1):381-408, 2023. bib ]
  7. Assessing the Solid Protocol in Relation to Security and Privacy Obligations. C. Esposito, R. Horne, L. Robaldo, B. Buelens and E. Goesaert. Information, 14(7), 2023. bib | URL | DOI ]
  8. Anomaly detection using deep learning respecting the resources on board a CubeSat. R. Horne, S. Mauw, A. Mizera and J. Thoemel. Journal of Aerospace Information Systems, 2023. bib | DOI ]
  9. When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus. R. Horne, S. Mauw and S. Yurkov. Theor. Comput. Sci., 959:113842, 2023. bib | URL | DOI ]
  10. Hierarchical message-passing graph neural networks. Z. Zhong, C.-T. Li and J. Pang. Data Mining and Knowledge Discovery, 37():381-408, 2023. bib ]

Conference Proceedings

  1. Loss and likelihood based membership inference of diffusion models. H. Hu and J. Pang. In Proceedings of the 26th International Conference on Information Security (ISC’23), Springer-Verlag, Lecture Notes in Computer Science 14411, pp. 121-141, 2023. bib ]
  2. Single-experiment reconstructibility of Boolean control networks revisited. G. Wu and J. Pang. In Proceedings of the 20th International Conference on Informatics in Control, Automation and Robotics (ICINCO’23), SciTePress, pp. 85-93, 2023. bib ]
  3. On observability analysis in multiagent systems. C. Mu and J. Pang. In Proceedings of the 26th European Conference on Artificial Intelligence (ECAI’23), IOS Press, pp. 1755-1762, 2023. bib ]
  4. Structural-semantics guided program simplification for understanding neural code intelligence models. C. Shi, T. Zhu, T. Zhang, J. Pang and M. Pan. In Proceedings of the 14th Asia-Pacific Symposium on Internetware (Internetware’23), ACM Press, pp. 1-11, 2023. bib ]
  5. Active learning based structural inference. A. Wang and J. Pang. In Proceedings of the 40th International Conference on Machine Learning (ICML’23), PMLR, pp. 36224-36245, 2023. bib ]
  6. Effective and efficient structural inference with reservoir computing. A. Wang, T.P. Tong and J. Pang. In Proceedings of the 40th International Conference on Machine Learning (ICML’23), PMLR, pp. 36391-36410, 2023. bib ]
  7. Election Verifiability in receipt-free voting protocols. S. Baloglu, S. Bursuc, S. Mauw and J. Pang. In Proceedings of the 36th IEEE Computer Security Foundations Symposium (CSF’23), IEEE Computer Society, pp. 63-78, 2023. bib ]
  8. Provably Unlinkable Smart Card-based Payments. S. Bursuc, R. Horne, S. Mauw and S. Yurkov. In In proceedings of ACM onference on Computer and Communications Security (CCS) 2023 26-30 November, 2023 Tivoli Congress Center, Copenhagen, Denmark, 2023. bib ]
  9. A Logical Account of Subtyping for Session Types. R. Horne and L. Padovani. In Proceedings 14th Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, PLACES@ETAPS 2023, Paris, France, 22 April 2023, EPTCS 378, pp. 26–37, 2023. bib | URL | DOI ]

Published in 2022

Edited Proceedings

  1. Proceedings of the 13th Asia-Pacific Symposium on Internetware. H. Mei, J. Lv, X. Li, G. Gao, J. Pang, L. Bu and G. Li, editors. 2022. bib ]

Journal Articles

  1. Theories of life and computation: Special issue on the occasion of the 65th birthday of Professor Gabriel Ciobanu. A. Alexandru, B. Aman and R. Horne. Theoretical Computer Science, 926:1-2, 2022. bib | DOI ]
  2. An Analytic Propositional Proof System on Graphs. M. Acclavio, R. Horne and L. Straßburger. Logical Methods in Computer Science, 18(4):1:1–1:80, 2022. bib | URL | DOI ]
  3. Cloud Removal from Satellite Imagery using Multispectral Edge-filtered Conditional Generative Adversarial Networks. C. Hasan, R. Horne, S. Mauw and A. Mizera. International Journal of Remote Sensing, 43(5):1881-1893, 2022. bib | DOI ]
  4. Unsupervised network embedding beyond homophily. Z. Zhong, G. Gonzalez, D. Grattarola and J. Pang. Transactions on Machine Learning Research, (), 2022. bib ]
  5. Simplifying node classification on heterophilous graphs with compatible label propagation. Z. Zhong, S. Ivanov and J. Pang. Transactions on Machine Learning Research, (), 2022. bib ]
  6. Personalised meta-path generation for heterogeneous graph neural networks. Z. Zhong, C.-T. Li and J. Pang. Data Mining and Knowledge Discovery, 36(6):2299-2333, 2022. bib ]
  7. A multilingual dataset of COVID-19 vaccination attitudes on Twitter. N. Chen, X. Chen and J. Pang. Data in Brief, 44():article 108503, 2022. bib ]
  8. Review of current human genome-scale metabolic models for brain cancer and neurodegenerative diseases. A. Kishk, M.P. Pacheco, T. Heurtaux, L. Sinkkonen, J. Pang, S. Fritah, S. Niclou and T. Sauter. Cells, 11(16):article 2486, 2022. bib ]
  9. Effective attributed network embedding with information behavior extraction. G. Hu, J. Pang and X. Mo. PeerJ Computer Science, 8:e1030, 2022. bib ]
  10. A large-scale empirical analysis of ransomware activities in Bitcoin. K. Wang, J. Pang, D. Chen, Y. Zhao, D. Hunag, C. Chen and W. Han. ACM Transactions on the Web, 16(2):7:1-7:29, 2022. bib ]
  11. THS-GWNN: A deep learning framework for temporal network link prediction. X. Mo, J. Pang and Z. Liu. Frontiers of Computer Science, 16(2):162304, 2022. bib ]
  12. Preventing active re-identification attacks on social graphs via sybil subgraph obfuscation. S. Mauw, Y. Ramírez-Cruz and R. Trujillo-Rasua. Knowledge and Information Systems, 64:1077–1100, 2022. bib | DOI ]
  13. Exploring Spillover Effects for COVID-19 Cascade Prediction. N. Chen, X. Chen, Z. Zhong and J. Pang. Entropy, 24(2):222, 2022. bib ]

Conference Proceedings

  1. Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus. C. Aubert, R. Horne and C. Johansen. In 33rd International Conference on Concurrency Theory (CONCUR 2022) 12-16 September, Warsaw, Poland, LIPIcs, pp. 30:1–30:26, 2022. bib | DOI ]
  2. Bisimulations Respecting Duration and Causality for the Non-interleaving Applied PI-Calculus. C. Aubert, R. Horne and C. Johansen. In Proceedings Combined 29th International Workshop on Expressiveness in Concurrency and 19th Workshop on Structural Operational Semantics (EXPRESS⁄SOS 2022), Warsaw, Poland, 12th September 2022, Electronic Proceedings in Theoretical Computer Science 368, pp. 3–22, 2022. bib | DOI ]
  3. A Graphical Proof Theory of Logical Time. M. Acclavio, R. Horne, S. Mauw and L. Straßburger. In 7th International Conference on Formal Structures for Computation and Deduction (FSCD 2022), Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs) 228, pp. 22:1–22:25, 2022. bib | DOI ]
  4. Is Eve nearby? Analysing protocols under the distant-attacker assumption. R. Gil-Pons, R. Horne, S. Mauw, A. Tiu and R. Trujillo. In IEEE Computer Security Foundations Symposium 2022 (CSF2022), August, 2022, Haifa, Israel, pp. 17-32, 2022. bib | URL | DOI ]
  5. Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments. R. Horne, S. Mauw and S. Yurkov. In IEEE Computer Security Foundations Symposium 2022 (CSF2022), August, 2022, Haifa, Israel, pp. 364-379, 2022. bib | URL | DOI ]
  6. Process Algebra Can Save Lives: Static Analysis of XACML Access Control Policies using mCRL2. H. Arshad, R. Horne, C. Johansen, O. Owe and T. Willemse. In FORTE 2022 - 42nd International Conference on Formal Techniques for Distributed Objects, Components, and Systems, Springer, Lecture Notes in Computer Science 13273, 2022. bib | URL | DOI ]
  7. Iterative structural inference of directed graphs. A. Wang and J. Pang. In Proceedings of the 36th Annual Conference on Neural Information Processing Systems (NeurIPS’22), 2022. bib ]
  8. NEGAR: Network embedding guided architecture recovery for software systems. J. Chen, Z. Wang, Y. Jiang, T. Zhang, J. Pang, X. Pan and J. Sun. In Proceedings of the 29th Asia-Pacific Software Engineering Conference (APSEC’22), IEEE Computer Society, pp. 2022. bib ]
  9. Target control of Boolean networks with permanent edgetic perturbations. O. Zeyen and J. Pang. In Proceedings of the 61st IEEE Conference on Decision and Control (CDC’22), IEEE Control Systems Society, pp. 4236-4243, 2022. bib ]
  10. The burden of being a bridge: Analysing subjective well-being of Twitter users during the COVID-19 pandemic. N. Chen, X. Chen, Z. Zhong and J. Pang. In Proceedings of the 33rd European Conference on Machine Learning and 26th European Conference on Principles and Practice of Knowledge Discovery in Databases (ECML⁄PKDD’22), Springer-Verlag, Lecture Notes in Computer Science, pp. 2022. bib ]
  11. Measuring COVID-19 vaccine hesitancy: Consistency of social media with surveys. N. Chen, X. Chen, J. Pang, L. Borga, C. D’Ambrosio and C. Vögele. In Proceedings of the 13th International Conference on Social Informatics (SocInfo’22), Springer-Verlag, Lecture Notes in Computer Science 13618, pp. 196-210, 2022. bib ]
  12. Functional scenario classification for Android applications using GNNs. G. Li, F. Zhu, J. Pang, T. Zhang, M. Pan and X. Li. In Proceedings of the 13th Asia-Pacific Symposium on Internetware (Internetware’22), ACM Press, pp. 1-9, 2022. bib ]
  13. Contingent payments from two-party signing and verification for abelian groups. S. Bursuc and S. Mauw. In 35th IEEE Computer Security Foundations Symposium, CSF 2022, Haifa, Israel, August 7-10, 2022, IEEE, pp. 195–210, 2022. bib | URL | DOI ]

Published in 2021

Journal Articles

  1. Analysis of centrality measures under differential privacy models. J. Laeuchli, Y. Ramírez-Cruz and R. Trujillo-Rasua. Applied Mathematics and Computation, 412, 2021. bib | DOI ]
  2. An exploratory study of COVID-19 information on twitter in the greater region. N. Chen, Z. Zhong and J. Pang. Big Data and Cognitive Computing, 5(1):5, 2021. bib ]
  3. Semantic and relational spaces in science of science: Deep learning models for article vectorisation. D. Kozlowski, J. Dusdal, J. Pang and A. Zilian. Scientometrics, 126(7):5881-5910, 2021. bib ]
  4. CABEAN: A software for the control of asynchronous Boolean networks. C. Su and J. Pang. Bioinformatics, 37(6):879-881, 2021. bib ]
  5. Effective link prediction with topological and temporal information using wavelet neural network embedding. X. Mo, J. Pang and Z. Liu. The Computer Journal, 64(3):325-336, 2021. bib ]
  6. Towards optimal decomposition of Boolean networks. C. Su, J. Pang and S. Paul. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 18(6):2167-2176, 2021. bib ]
  7. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. K. Ahn, R. Horne and A. Tiu. Logical Methods in Computer Science, 17(3):2:1–2:40, 2021. bib | URL | DOI ]
  8. Discovering ePassport Vulnerabilities using Bisimilarity. R. Horne and S. Mauw. Logical Methods in Computer Science, 17(2):24:1–24:52, 2021. bib | URL | DOI ]
  9. An Exploratory Study of COVID-19 Information on Twitter in the Greater Region. N. Chen, Z. Zhong and J. Pang. Big Data and Cognitive Computing, 5, 2021. bib | DOI ]

Conference Proceedings

  1. Pattern Recognition and Reconstruction: Detecting Malicious Deletions in Textual Communications. A. Solanke, X. Chen and Y. Ramírez-Cruz. In 2021 IEEE International Conference on Big Data, IEEE, pp. 2574–2582, 2021. bib | DOI ]
  2. Examining Linguistic Biases in Telegram with a Game Theoretic Analysis. S. Höhn, N. Asher and S. Mauw. In Proceedings of the 3rd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM), pp. 16–32, 2021. bib ]
  3. What Does It Cost to Deploy an XAI System: A Case Study in Legacy Systems. S. Höhn and N. Faradouris. In International Workshop on Explainable, Transparent Autonomous Agents and Multi-Agent Systems, Springer, pp. 173–186, 2021. bib ]
  4. SafeTraveller-A conversational assistant for BeNeLux travellers. K. Kudryavtseva and S. Höhn. In Proceedings of BNAIC⁄BENELEARN2021, 2021. bib ]
  5. From\# jobsearch to\# mask: improving COVID-19 cascade prediction with spillover effects. N. Chen, X. Chen, Z. Zhong and J. Pang. In Proceedings of the 2021 IEEE⁄ACM International Conference on Advances in Social Networks Analysis and Mining, IEEE⁄ACM, pp. 455–462, 2021. bib ]
  6. \#Jobsearch to \#Mask: Improving COVID-19 cascade prediction with spillover effects. N. Chen, X. Chen, Z. Zhong and J. Pang. In Proceedings of the 2021 Workshop on Social Influence (SI’21) (as part of 13th IEEE⁄ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’21)), IEEE Computer Society, pp. 455-462, 2021. bib ]
  7. Stealing machine learning models: Attacks and countermeasures for generative adversarial networks. H. Hu and J. Pang. In Proceedings of the 37th Annual Computer Security Applications Conference (ASSAC’21), ACM Press, pp. 1-16, 2021. bib ]
  8. Membership inference attacks against GANs by leveraging over-representation regions. H. Hu and J. Pang. In Proceedings of the 27th ACM SIGSAC Conference on Computer and Communications Security (CCS’21), ACM Press, pp. 2387-2389, 2021. bib ]
  9. CABEAN 2.0: Efficient and efficacious control of asynchronous Boolean networks. C. Su and J. Pang. In Proceedings of the 24th International Symposium on Formal Methods (FM’21), Springer-Verlag, Lecture Notes in Computer Science 13047, pp. 581-598, 2021. bib ]
  10. Provably improving election verifiability in Belenios. S. Baloglu, S. Bursuc, S. Mauw and J. Pang. In Proceedings of the 6th International Joint Conference on Electronic Voting (E-VOTE-ID’21), Springer-Verlag, Lecture Notes in Computer Science 12900, pp. 1-16, 2021. bib ]
  11. Temporal networks based industry identification for Bitcoin users. W. Han, D. Chen, J. Pang, K. Wang, C. Chen, D. Huang and Z. Fan. In Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications (WASA’21), Springer-Verlag, Lecture Notes in Computer Science 12937, pp. 108-120, 2021. bib ]
  12. Hilbert Sinkhorn divergence for optimal transport. Q. Li, Z. Wang, G. Li, J. Pang and G. Xu. In Proceedings of the 2021 IEEE⁄CVF Conference on Computer Vision and Pattern Recognition (CVPR’21), Computer Vision Foundation, pp. 3835-3844, 2021. bib ]
  13. Election verifiability revisited: Automated security proofs and attacks on Helios and Belenios. S. Baloglu, S. Bursuc, S. Mauw and J. Pang. In Proceedings of the 34th IEEE Computer Security Foundations Symposium (CSF’21), IEEE Computer Society, pp. 1-15, 2021. bib ]
  14. Compositional Analysis of Protocol Equivalence in the Applied $pi$-Calculus Using Quasi-open Bisimilarity. R. Horne, S. Mauw and S. Yurkov. In Theoretical Aspects of Computing – ICTAC 2021, Springer International Publishing, pp. 235–255, 2021. bib | DOI ]
  15. Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom. R.J. van Glabeek, P. Höfner and R. Horne. In 36th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’21), IEEE, pp. 1-16, 2021. bib | URL | DOI ]

Published in 2020

Edited Proceedings

  1. Proc. 6th Global Conference on Artificial Intelligence (GCAI’20). G. Danoy, J. Pang and G. Sutcliffe, editors. EPiC Series in Computing 72, 2020. bib ]
  2. Proc. 6th International Symposium on Dependable Software Engineering. Theories, Tools, and Applications (SETTA’20). J. Pang and L. Zhang, editors. Lecture Notes in Computer Science 12153, 2020. bib ]

Journal Articles

  1. An efficient approach towards the source-target control of Boolean networks. S. Paul, C. Su, J. Pang and A. Mizera. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 17(6):1932-1945, 2020. bib ]
  2. Fine-Grained Code Coverage Measurement in Automated Black-Box Android Testing. A. Pilgun, O. Gadyatskaya, Y. Zhauniarovich, S. Dashevskyi, A. Kushniarou and S. Mauw. ACM Trans. Softw. Eng. Methodol., 29(4), 2020. bib | URL | DOI ]
  3. Global types with internal delegation. I. Castellani, M. Dezani-Ciancaglini, P. Giannini and R. Horne. Theoretical Computer Science, 807:128 - 153, 2020. bib | URL | DOI ]
  4. Attribute evaluation on attack trees with incomplete information. A. Buldas, O. Gadyatskaya, A. Lenin, S. Mauw and R. Trujillo-Rasua. Computers & Security, 88:101630, 2020. bib | DOI ]
  5. Publishing Community-Preserving Attributed Social Graphs with a Differential Privacy Guarantee. X. Chen, S. Mauw and Y. Ramírez-Cruz. Proceedings on Privacy Enhancing Technologies, 2020(4):131–152, 2020. bib | DOI ]

Conference Proceedings

  1. Accelerated verification of parametric protocols with decision trees. Y. Li, T. Cao, D. Jansen, J. Pang and X. Wei. In Proc. 38th IEEE International Conference on Computer Design (ICCD’20), IEEE Computer Society, pp. 397-404, 2020. bib ]
  2. NeuLP: An end-to-end deep-learning model for link prediction. Z. Zhong, Y. Zhang and J. Pang. In Proc. 21st International Conference on Web Information System Engineering (WISE’20), Springer-Verlag, Lecture Notes in Computer Science 12342, pp. 96-108, 2020. bib ]
  3. Higher-order graph convolutional embedding for temporal networks. X. Mo, J. Pang and Z. Liu. In Proc. 21st International Conference on Web Information System Engineering (WISE’20), Springer-Verlag, Lecture Notes in Computer Science 12342, pp. 3-15, 2020. bib ]
  4. A dynamics-based approach for the target control of Boolean networks. C. Su and J. Pang. In Proc. 11th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB’20), ACM Press, pp. 50:1-50:8, 2020. bib ]
  5. Sequential temporary and permanent control of Boolean networks. C. Su and J. Pang. In Proc. 18th International Conference on Computational Methods in Systems Biology (CMSB’20), Springer-Verlag, Lecture Notes in Computer Science 12314, pp. 234-251, 2020. bib ]
  6. Online observability of Boolean control networks. G. Wu, L. Dai, Z. Liu, T. Chen and J. Pang. In Proc. 21st World Congress of the International Federation of Automatic Control (IFAC’20), IFAC, IFAC-Papers On Line, pp. 2020. bib ]
  7. Don’t Trust Me, Test Me: 100\% Code Coverage for a 3rd-party Android App. A. Pilgun. In 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, December 1-4, 2020, in press, 2020. bib ]
  8. Dissecting Android Cryptocurrency Miners. S. Dashevskyi, Y. Zhauniarovich, O. Gadyatskaya, A. Pilgun and H. Ouhssain. In Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, Association for Computing Machinery, CODASPY ’20, pp. 191–202, 2020. bib | URL | DOI ]
  9. Attack-Defence Frameworks: Argumentation-Based Semantics for Attack-Defence Trees. D.M. Gabbay, R. Horne, S. Mauw and L. van der Torre. In Graphical Models for Security - 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020 Revised Selected Papers, Springer, Lecture Notes in Computer Science 12419, pp. 143–165, 2020. bib | URL | DOI ]
  10. Session Subtyping and Multiparty Compatibility Using Circular Sequents. R. Horne. In 31st International Conference on Concurrency Theory (CONCUR 2020), Schloss Dagstuhl–Leibniz-Zentrum für Informatik, Leibniz International Proceedings in Informatics (LIPIcs) 171, pp. 12:1–12:22, 2020. bib | URL | DOI ]
  11. Logic Beyond Formulas: A Graphical Proof System. M. Acclavio, R. Horne and L. Straßburger. In 35th Annual ACM⁄IEEE Symposium on Logic in Computer Science (LICS ’20), July 8–11, 2020, Saarbrücken, Germany, ACM, pp. 15, 2020. bib | URL | DOI ]
  12. Active Re-identification Attacks on Periodically Released Dynamic Social Graphs. X. Chen, E. Këpuska, S. Mauw and Y. Ramírez-Cruz. In Computer Security - ESORICS 2020, Springer, Lecture Notes in Computer Science 12309, pp. 185–205, 2020. bib | URL | DOI ]

PhD Theses

  1. Scalable Control of Asynchronous Boolean Networks. C. Su. PhD thesis, University of Luxembourg, 2020. bib ]
  2. Instruction coverage for Android app Testing and Tuning. A. Pilgun. PhD thesis, University of Luxembourg, 2020. bib ]

Miscellaneous

  1. pilgun⁄acvcut: ACVCut v1.0. A. Pilgun. 2020. bib | URL | DOI ]
  2. Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios. S. Baloglu, S. Bursuc, S. Mauw and J. Pang. Cryptology ePrint Archive, Report 2020⁄982, 2020. bib ]

Published in 2019

Edited Proceedings

  1. Graphical Models for Security - 6th International Workshop, GraMSec@CSF 2019, Hoboken, NJ, USA, June 24, 2019, Revised Papers. M. Albanese, R. Horne and C.W. Probst, editors. Lecture Notes in Computer Science 11720, 2019. bib | URL | DOI ]
  2. Proceedings of the 15th International Workshop on Security and Trust Management (STM 2019), Luxembourg, September 26-27, 2019. S. Mauw and M. Conti, editors. Lecture Notes in Computer Science 11738, 2019. bib ]
  3. Proceedings of the 24th International Conference on Engineering of Complex Computer Systems. J. Pang and J. Sun, editors. 2019. bib | from publisher ]

Journal Articles

  1. De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. ACM Transactions in Computational Logic (TOCL), 20(4):22:1–22:44, 2019. bib | URL | DOI ]
  2. Constructing Weak Simulations from Linear Implications for Processes with Private Names. R. Horne and A. Tiu. Mathematical Structures in Computer Science, 29(8):1275-1308, 2019. bib | URL | DOI ]
  3. Algorithms for the sequential reprogramming of Boolean networks. H. Mandon, C. Su, J. Pang, S. Paul, S. Haar and L. Paulevé. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 16(5):1610-1619, 2019. bib ]
  4. Controlling Large Boolean Networks with Single-Step Perturbations. A. Baudin, S. Paul, C. Su and J. Pang. Bioinformatics, 35(14):i558-i567, 2019. bib ]
  5. A new decomposition-based method for detecting attractors in synchronous Boolean networks. Q. Yuan, A. Mizera, J. Pang and H. Qu. Science of Computer Programming, 180:18-35, 2019. bib ]
  6. An active learning-based approach for location-aware acquaintance inference. B.-H. Chen, C.-T. Li, K.-T. Chuang, J. Pang and Y. Zhang. Knowledge and Information Systems, 59(3):539-569, 2019. bib ]
  7. GPU-accelerated steady-state computation of large probabilistic Boolean networks. A. Mizera, J. Pang and Y. Q. Formal Aspects of Computing, 31(1):27-46, 2019. bib ]
  8. Taming asynchrony for attractor detection in large Boolean networks. A. Mizera, J. Pang, H. Qu and Q. Yuan. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 16(1):31-42, 2019. bib ]
  9. The Local Metric Dimension of the Lexicographic Product of Graphs. G.A. Barragán-Ramírez, A. Estrada-Moreno, Y. Ramírez-Cruz and J.A. Rodríguez-Velázquez. Bulletin of the Malaysian Mathematical Sciences Society, 42(5):2481–2496, 2019. bib | DOI ]
  10. Conditional adjacency anonymity in social graphs under active attacks. S. Mauw, Y. Ramírez-Cruz and R. Trujillo-Rasua. Knowledge and Information Systems, 61(1):485–511, 2019. bib | DOI ]
  11. Robust active attacks on social graphs. S. Mauw, Y. Ramírez-Cruz and R. Trujillo-Rasua. Data Mining and Knowledge Discovery, 33(5):1357–1392, 2019. bib | DOI ]
  12. Distance-based vertex identification in graphs: the outer multiset dimension. R. Gil-Pons, Y. Ramírez-Cruz, R. Trujillo-Rasua and I.G. Yero. Applied Mathematics and Computation, 363, 2019. bib | DOI ]

Conference Proceedings

  1. Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. I. Filimonov, R. Horne, S. Mauw and Z. Smith. In Computer Security – ESORICS 2019, Springer International Publishing, pp. 577–594, 2019. bib | URL | DOI ]
  2. Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. S. Bursuc and S. Kremer. In Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I, pp. 361–382, 2019. bib | URL | DOI ]
  3. Private Votes on Untrusted Platforms: Models, Attacks and Provable Scheme. S. Bursuc, C. Dragan and S. Kremer. In IEEE European Symposium on Security and Privacy, EuroS&P 2019, Stockholm, Sweden, June 17-19, 2019, pp. 606–620, 2019. bib | URL | DOI ]
  4. Post-Collusion Security and Distance Bounding. S. Mauw, Z. Smith, J. Toro-Pozo and R. Trujillo-Rasua. In Proc. 26th ACM Conference on Computer and Communications Security (CCS’19), ACM Press, pp. 941–958, 2019. bib ]
  5. A learning-based framework for automatic parameterized verification. Y. Li, J. Cao and J. Pang. In Proc. 37th IEEE International Conference on Computer Design (ICCD’19), IEEE Computer Society, pp. 450-459, 2019. bib ]
  6. A graph-based approach to explore relationship between hashtags and images. Z. Zhong, Y. Zhang and J. Pang. In Proc. 20th International Conference on Web Information System Engineering (WISE’19), Springer-Verlag, Lecture Notes in Computer Science 11881, pp. 473-488, 2019. bib ]
  7. Controlling large Boolean networks with temporary and permanent perturbations. C. Su, S. Paul and J. Pang. In Proc. 23rd International Symposium on Formal Methods (FM’19), Springer-Verlag, Lecture Notes in Computer Science 11800, pp. 707-724, 2019. bib ]
  8. Sequential reprogramming of Boolean networks made practical. H. Mandon, C. Su, S. Haar, J. Pang and L. Paulevé. In Proc. 17th International Conference on Computational Methods in Systems Biology (CMSB’19), Springer-Verlag, Lecture Notes in Computer Science 11773, pp. 3-19, 2019. bib ]
  9. Scalable control of asynchronous Boolean networks. C. Su, S. Paul and J. Pang. In Proc. 17th International Conference on Computational Methods in Systems Biology (CMSB’19), Springer-Verlag, Lecture Notes in Computer Science 11773, pp. 364-367, 2019. bib ]
  10. Attack-Tree Series: A Case for Dynamic Attack Tree Analysis. O. Gadyatskaya and S. Mauw. In Proc. 6th International Workshop on Graphical Models for Security (GraMSec’19), Springer Verlag, LNCS 11720, pp. 7-19, 2019. bib ]
  11. The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic. R. Horne. In 4th International Conference on Formal Structures for Computation and Deduction (FSCD 2019)., LIPIcs, pp. 23:1–23:16, 2019. bib | URL | DOI ]

PhD Theses

  1. Computational and Symbolic Analysis of Distance-Bounding Protocols .. J. Pozo. PhD thesis, University of Luxembourg, 2019. bib ]

Published in 2018

Edited Proceedings

  1. Graphical Models for Security - 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers. P. Liu, S. Mauw and K. Stølen, editors. Lecture Notes in Computer Science 10744, 2018. bib | URL | DOI ]
  2. Proceedings of the 12th International Symposium on Theoretical Aspects of Software Engineering. J. Pang, C. Zhang, J. He and J. Weng, editors. 2018. bib | from publisher ]

Journal Articles

  1. Anonymising social graphs in the presence of active attackers. S. Mauw, Y. Ramírez-Cruz and R. Trujillo-Rasua. Transactions on Data Privacy, 11(2):169–198, 2018. bib | URL ]
  2. Strategic Conversations Under Imperfect Information: Epistemic Message Exchange Games. N. Asher and S. Paul. Journal of Logic, Language and Information, 27(4):343-385, 2018. bib ]
  3. An automatic proving approach to parameterized verification. Y. Li, K. Duan, D. Jansen, J. Pang, L. Zhang, Y. Lv and S. Cai. ACM Transactions on Computational Logic, 19(4):1-27, 2018. bib ]
  4. Reviving the two-state Markov chain approach. A. Mizera, J. Pang and Q. Yuan. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 15(5):1525-1537, 2018. bib ]
  5. Probabilistic model learning for model checking: An empirical study and a new approach. J. Wang, J. Sun, Q. Yuan and J. Pang. International Journal on Software Tools for Technology Transfer, 20(6):689-704, 2018. bib ]
  6. ASSA-PBN: A toolbox for probabilistic Boolean networks. A. Mizera, J. Pang, C. Su and Q. Yuan. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 15(4):1203-1216, 2018. bib ]
  7. Security of Distance-Bounding: A Survey. G. Avoine, M. Bingöl, I. Boureanu, S. Čapkun, G. Hancke, S. Kardas, C. Kim, C. Lauradoux, B. Martin, J. Munilla, A. Peinado, K. Rasmussen, D. Singelée, A. Tchamkerten, R. Trujillo-Rasua and S. Vaudenay. ACM Computing Survey, 51(5), 2018. bib ]

Conference Proceedings

  1. The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement. R. Horne, S. Mauw and A. Tiu. In Graphical Models for Security, Springer International Publishing, pp. 90–110, 2018. bib | URL | DOI ]
  2. Quasi-Open Bisimilarity with Mismatch is Intuitionistic. R. Horne, K. Ahn, S. Lin and A. Tiu. In In Proceedings of LICS ’18: 33rd Annual ACM⁄IEEE Symposium on Logic in Computer Science, Oxford, United Kingdom, July 9-12, 2018 (LICS ’18), pp. 26-35, 2018. bib | URL | DOI ]
  3. Semi-automatically Augmenting Attack Trees using an Annotated Attack Tree Library. R. Jhawar, K. Lounis, S. Mauw and Y. Ramírez-Cruz. In Security and Trust Management, Springer, Lecture Notes in Computer Science 11091, pp. 85–101, 2018. bib | URL | DOI ]
  4. The Influence of Code Coverage Metrics on Automated Testing Efficiency in Android. S. Dashevskyi, O. Gadyatskaya, A. Pilgun and Y. Zhauniarovich. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, CCS ’18, pp. 2216–2218, 2018. bib | URL | DOI ]
  5. An Effective Android Code Coverage Tool. A. Pilgun, O. Gadyatskaya, S. Dashevskyi, Y. Zhauniarovich and A. Kushniarou. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, ACM, CCS ’18, pp. 2189–2191, 2018. bib | URL | DOI ]
  6. Automated Identification of Desynchronisation Attacks on Shared Secrets. S. Mauw, Z. Smith, J. Toro-Pozo and R. Trujillo-Rasua. In Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I, pp. 406–426, 2018. bib | URL | DOI ]
  7. Distance-Bounding Protocols: Verification without Time and Location. S. Mauw, Z. Smith, J. Toro-Pozo and R. Trujillo-Rasua. In 2018 IEEE Symposium on Security and Privacy, S&P 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA, pp. 549–566, 2018. bib | URL | DOI ]
  8. L-CMP: An automatic learning-based parameterized verification tool. J. Cao, Y. Li and J. Pang. In Proc. 33rd IEEE⁄ACM International Conference on Automated Software Engineering (ASE’18), ACM Press, pp. 892-895, 2018. bib ]
  9. A decomposition-based approach towards the control of Boolean networks. S. Paul, C. Su, J. Pang and A. Mizera. In Proc. 9th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics (BCB’18), ACM Press, pp. 11-20, 2018. bib ]
  10. Towards the existential control of Boolean networks: a preliminary report. S. Paul, J. Pang and C. Su. In Proc. 4th International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA’18), Springer-Verlag, Lecture Notes in Computer Science 10998, pp. 142-147, 2018. bib ]
  11. ASSA-PBN 3.0: Analysing context-sensitive probabilistic Boolean networks. A. Mizera, J. Pang, H. Qu and Q. Yuan. In Proc. 16th International Conference on Computational Methods in Systems Biology (CMSB’18), Springer-Verlag, Lecture Notes in Computer Science 11095, pp. 277-284, 2018. bib ]
  12. On the Full Control of Boolean Networks. S. Paul, J. Pang and C. Su. In Proc. 16th International Conference on Computational Methods in Systems Biology (CMSB’18), Springer-Verlag, Lecture Notes in Computer Science 11095, pp. 313-317, 2018. bib ]
  13. Tagvisor: A privacy advisor for sharing hashtags. Y. Zhang, M. Humbert, T. Rahman, C.-T. Li, J. Pang and M. Backes. In Proc. The Web Conference 2018 (WWW’18), ACM Press, pp. 287-296, 2018. bib ]
  14. New Directions in Attack Tree Research: Catching up with Industrial Needs. O. Gadyatskaya and R. Trujillo-Rasua. In The Fourth International Workshop on Graphical Models for Security, GraMSec’17, Santa Barbara, CA, USA, August 21, 2017, Springer, Lecture Notes in Computer Science 10744, 2018. bib | DOI ]

Miscellaneous

  1. pilgun⁄acvtool: ACVTool v0.2. A. Pilgun, Y. Zhauniarovich and O. Gadyatskaya. 2018. bib | URL | DOI ]

Published in 2017

Journal Articles

  1. Semantics for Specialising Attack Trees based on Linear Logic. R. Horne, S. Mauw and A. Tiu. Fundamenta Informaticae, 153(1-2):57-86, 2017. bib | URL | DOI ]
  2. The Simultaneous Local Metric Dimension of Graph Families. G.A. Barragán-Ramírez, A. Estrada-Moreno, Y. Ramírez-Cruz and J.A. Rodríguez-Velázquez. Symmetry, 9(8), 2017. bib | DOI ]
  3. Semantics for Specialising Attack Trees based on Linear Logic. R. Horne, S. Mauw and A. Tiu. Fundamenta Informaticae, 153(1-2):57–86, 2017. bib | URL ]
  4. Formal modelling and analysis of receipt-free auction protocols in applied pi. N. Dong, H.L. Jonker and J. Pang. Computers & Security, 65():405-432, 2017. bib ]
  5. Similarities and Differences Between the Vertex Cover Number and the Weakly Connected Domination Number of a Graph. M. Lemanska, J. Rodríguez-Velázquez and R. Trujillo-Rasua. Fundam. Inform., 152(3):273–287, 2017. bib | URL | DOI ]

Conference Proceedings

  1. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic. K. Ahn, R. Horne and A. Tiu. In 28th International Conference on Concurrency Theory (CONCUR 2017)., Leibniz International Proceedings in Informatics 85, pp. 7:1-7:17, 2017. bib | URL | DOI ]
  2. Reverse Bayesian poisoning: How to use spam filters to manipulate online elections. H. Jonker, S. Mauw and T. Schmitz. In Proc. 2nd International Joint Conference on Electronic Voting (E-Vote-ID’17), Springer-Verlag, Lecture Notes in Computer Science 10615, pp. 183–197, 2017. bib | URL ]
  3. Model-Driven Situational Awareness for Moving Target Defense. R. Jhawar and S. Mauw. In Proc. 16th European Conference on Cyber Warfare and Security (ECCWS’17), ACPI, pp. 184–192, 2017. bib | URL ]
  4. A Security Perspective on Publication Metrics. H. Jonker and S. Mauw. In Proc. 25th Security Protocols Workshop, Springer-Verlag, LNCS 10476, pp. 186–200, 2017. bib | URL ]
  5. Semantic annotation for places in LBSN through graph embedding. Y. Wang, Z. Qin, J. Pang, Y. Zhang and X. Jin. In Proc. 26th ACM International Conference on Information and Knowledge Management (CIKM’17), ACM Press, pp. 2343-2346, 2017. bib ]
  6. walk2friends: Inferring social links from mobility profiles. M. Backes, M. Humbert, J. Pang and Y. Zhang. In Proc. 24th ACM International Conference on Computer and Communications Security (CCS’17), ACM Press, pp. 1943-1957, 2017. bib ]
  7. A decomposition method for attractor detection in large synchronous Boolean networks. A. Mizera, J. Pang, H. Qu and Q. Yuan. In Proc. 3rd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA’17), Springer-Verlag, Lecture Notes in Computer Science 10606, pp. 232-249, 2017. bib ]
  8. A verification framework for stateful security protocols. L. Li, N. Dong, J. Pang, J. Sun, G. Bai, Y. Liu and J.-S. Dong. In Proc. 19th Conference on Formal Engineering Methods (ICFEM’17), Springer-Verlag, Lecture Notes in Computer Science 10610, pp. 262-280, 2017. bib ]
  9. Does \#like4like Indeed Provoke More Likes?. Y. Zhang, M. Ni, W. Han and J. Pang. In Proc. 16th IEEE⁄WIC⁄ACM International Conference on Web Intelligence (WI’17), ACM Press, pp. 179-186, 2017. bib ]
  10. Quantifying location sociality. J. Pang and Y. Zhang. In Proc. 28th ACM Conference on Hypertext and Social Media (HT’17), ACM Press, pp. 145-154, 2017. bib ]
  11. DeepCity: A feature learning framework for mining location check-ins. J. Pang and Y. Zhang. In Proc. 11th International AAAI Conference on Web and Social Media (ICWSM’17), AAAI Press, pp. 652-655, 2017. bib ]
  12. Should we learn probabilistic models for model checking? A new approach and an empirical study. J. Wang, J. Sun, Q. Yuan and J. Pang. In Proc. 20th International Conference on Fundamental Approaches to Software Engineering (FASE’17), Springer-Verlag, Lecture Notes in Computer Science 10202, pp. 3-21, 2017. bib ]
  13. Refinement-Aware Generation of Attack Trees. O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-Rasua and T.A.C. Willemse. In Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, LNCS 10547, pp. 164–179, 2017. bib | URL | DOI ]
  14. Towards Formal Security Analysis of Industrial Control Systems. M. Rocchetto and N. Tippenhauer. In Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS), 2017. bib ]

PhD Theses

  1. Computational Methods for Analysing Long-run Dynamics of Large Biological Networks. Q. Yuan. PhD thesis, University of Luxembourg, 2017. bib ]

Published in 2016

Edited Proceedings

  1. Proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2016), Darmstadt, Germany, July 18-22, 2016. S. Habib, J. Vassileva, S. Mauw and M. Mühlhäuser, editors. IFIP Advances in Information and Communication Technology 473, 2016. bib | URL ]
  2. Proceedings of the Second International Workshop on Graphical Models for Security (GraMSec 2015), Verona, Italy, July 13, 2015. S. Mauw, B. Kordy and S. Jajodia, editors. Lecture Notes in Computer Science 9390, 2016. bib | URL ]

Journal Articles

  1. A descriptive type foundation for RDF Schema. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 85(5):681-706, 2016. bib | URL | DOI ]
  2. Chemometric analysis of attenuated total reflectance infrared spectra of \emphProteus mirabilis strains with defined structures of LPS.. P. \.Zarnowiec, A. Mizera, M. Chrapek, M. Urbaniak and W. Kaca. Innate Immunity, 22(5):325–335, 2016. bib ]
  3. Characterizing 1-metric antidimensional trees and unicyclic graphs. R. Trujillo-Rasua and I.G. Yero. The Computer Journal, 2016. bib ]
  4. k-Metric antidimension: A privacy measure for social graphs. R. Trujillo-Rasua and I. Yero. Inf. Sci., 328:403 – 417, 2016. bib ]
  5. Preface: Selected and extended papers from ACM SVT 2014. J. Pang and M. Stoelinga. Science of Computer Programming, 123:1, 2016. bib ]
  6. Editorial (ICFEM 14 special issue, part II). S. Merz, J. Pang and J.S. Dong. Formal Aspects of Computing, 28(5):723-724, 2016. bib ]
  7. Editorial (ICFEM 14 special issue, part I). S. Merz, J. Pang and J.S. Dong. Formal Aspects of Computing, 28(3):343-344, 2016. bib ]
  8. Improving BDD-based attractor detection for synchronous Boolean networks. Q. Yuan, H. Qu, J. Pang and A. Mizera. SCIENCE CHINA Information Sciences, 59: 080101, 2016. bib | DOI ]

Conference Proceedings

  1. Private Names in Non-Commutative Logic. R. Horne, A. Tiu, B. Aman and G. Ciobanu. In 27th International Conference on Concurrency Theory (CONCUR 2016), Leibniz International Proceedings in Informatics, pp. 31:1-31:16, 2016. bib | URL | DOI ]
  2. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees. R. Jhawar, K. Lounis and S. Mauw. In Proc. 12th Workshop on Security and Trust Management (STM’16), Springer-Verlag, Lecture Notes in Computer Science 9871, pp. 138–153, 2016. bib ]
  3. Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems. G. Lenzini, S. Mauw and S. Ouchani. In Proc. 12th Workshop on Security and Trust Management (STM’16), Springer-Verlag, Lecture Notes in Computer Science 9871, pp. 170–178, 2016. bib ]
  4. Optimality Results on the Security of Lookup-Based Protocols. S. Mauw, J. Toro-Pozo and R. Trujillo-Rasua. In Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers, pp. 137–150, 2016. bib | DOI ]
  5. A Topological Categorization of Agents for the Definition of Attack States in Multi-Agent Systems. K. Santacà, M. Cristani, M. Rocchetto and L. Viganò. In At the 14th European Conference on Multi-Agent Systems (EUMAS 2016), Spain, December 15, December 16, 2016, 2016. bib ]
  6. CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. M. Rocchetto and N. Tippenhauer. In At the 18th Conference on Formal Engineering Methods (ICFEM 2016), Japan, November 14, November 18, 2016, 2016. bib ]
  7. Using attack-defense trees to analyze threats and countermeasures in an ATM: A case study. M. Fraile, M. Ford, O. Gadyatskaya, R. Kumar, M. Stoelinga and R. Trujillo-Rasua. In At the 9th IFIP WG 8.1 Working Conference on The Practice of Enterprise Modeling (PoEM) 8 - 10 November, 2016, Skövde, Sweden, 2016. bib | preprint ]
  8. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0. O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw and R. Trujillo-Rasua. In Proc. 13th International Conference on Quantitative Evaluation of SysTems (QEST’16), Springer Verlag, LNCS 9826, pp. 159–162, 2016. bib | preprint ]
  9. The Fréchet⁄Manhattan distance and the trajectory anonymisation problem. C. Torres and R. Trujillo-Rasua. In 30th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Trento, Italy, July 18-21, 2016, 2016. bib | preprint ]
  10. Counteracting active attacks in social network graphs. S. Mauw, R. Trujillo-Rasua and B. Xuan. In Proc. 13th Annual IFIP WGII.3 Working Conference on Data and Applications Security and Privacy (DBSec’16), Springer-Verlag, LNCS 9766, pp. 233–248, 2016. bib | preprint ]
  11. Automating Cyber Defence Responses using Attack-Defense Trees and Game Theory. R. Jhawar, S. Mauw and I. Zakiuddin. In Proc. 15th European Conference on Cyber Warfare and Security (ECCWS’16), ACPI, pp. 163–172, 2016. bib ]
  12. Man-in-the-middle attacks evolved... but our security models didn’t. H. Jonker, S. Mauw and R. Trujillo-Rasua. In Proc. 24th Security Protocols Workshop, Springer-Verlag, LNCS, 2016. bib | preprint ]
  13. A class of precomputation-based distance-bounding protocols. S. Mauw, J. Toro-Pozo and R. Trujillo-Rasua. In Proc. 1st IEEE European Symposium on Security and Privacy (EuroS&P’16), IEEE, pp. 97–111, 2016. bib | preprint ]
  14. Modeling city locations as complex networks: An initial study. Z. Zhou, Y. Zhang, J. Pang and C.-T. Li. In Proc. 5th International Workshop on Complex Networks and their Applications (CNA’16), Springer-Verlag, Studies in Computational Intelligence Series 693, pp. 735-747, 2016. bib ]
  15. An empirical study on user access control in online social networks. H.W. M. Ni, Y. Zhang and J. Pang. In Proc. 21st ACM Symposium on Access Control Models and Technologies (SACMAT’16), ACM Press, pp. 13-23, 2016. bib ]
  16. A novel approach to parameterized verificationof cache coherence protocols. Y. Li, K. Duan, Y. Lv, J. Pang and S. Cai. In Proc. 34th IEEE International Conference on Computer Design (ICCD’16), IEEE Computer Society, pp. 560-567, 2016. bib ]
  17. On impact of weather on human mobility in cities. J. Pang, P. Zablotskaia and Y. Zhang. In Proc. 17th International Conference on Web Information System Engineering (WISE’16), Springer-Verlag, Lecture Notes in Computer Science 10042, pp. 247-256, 2016. bib ]
  18. Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 31st Annual ACM Symposium on Applied Computing (SAC’16), ACM, pp. 1-8, 2016. bib ]
  19. Fast simulation of probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 14th International Conference on Computational Methods in Systems Biology (CMSB’16), Springer-Verlag, Lecture Notes in Computer Science 9859, pp. 216–231, 2016. bib ]
  20. GPU-accelerated steady-state computation of large probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 2nd International Symposium on Dependable Software Engineering: Theories, Tools, and Applications (SETTA’16), Springer-Verlag, Lecture Notes in Computer Science 9984, pp. 50–66, 2016. bib ]
  21. ASSA-PBN 2.0: A software tool for probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 14th International Conference on Computational Methods in Systems Biology (CMSB’16), Springer-Verlag, Lecture Notes in Computer Science 9859, pp. 309–315, 2016. bib ]
  22. Evaluation of Resource-based App Repackaging Detection in Android. O. Gadyatskaya, A.-L. Lezza and Y. Zhauniarovich. In Proc. of NordSec, Springer, LNCS 10014, 2016. bib ]
  23. Small changes, big changes: An updated view on the Android permission system. Y. Zhauniarovich and O. Gadyatskaya. In Proc. of RAID, Springer, LNCS 9854, pp. 346-367, 2016. bib ]
  24. Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees. O. Gadyatskaya, C. Harpes, S. Mauw, C. Muller and S. Muller. In Proc. 3rd International Workshop on Graphical Model for Security (GraMSec’16), Springer Verlag, LNCS 9987, pp. 80–93, 2016. bib ]
  25. Towards Empirical Evaluation of Automated Risk Assessment Methods. O. Gadyatskaya, K. Labunets and F. Paci. In Proc. of CRiSIS, Springer, 2016. bib ]
  26. Modelling Attack-defense Trees Using Timed Automata. O. Gadyatskaya, R.R. Hansen, K.G. Larsen, A. Legay, M.C. Olesen and D.B. Poulsen. In Proc. of FORMATS, Springer, LNCS 9884, pp. 35-50, 2016. bib ]
  27. SPEC: An Equivalence Checker for Security Protocols. A. Tiu, N. Nguyen and R. Horne. In Programming Languages and Systems - 14th Asian Symposium, APLAS 2016, Hanoi, Vietnam, November 21-23, 2016, Proceedings, Lecture Notes in Computer Science 10017, pp. 87–95, 2016. bib | DOI ]

Published in 2015

Book Chapters

  1. Privacy in Spatio-Temporal Databases: A Microaggregation-Based Approach. R. Trujillo-Rasua and J. Domingo-Ferrer. In Advanced Research in Data Privacy, Springer, Cham, pp. 197–214, 2015. bib ]

Edited Proceedings

  1. Embracing Global Computing in Emerging Economies - First Workshop, EGC 2015, Almaty, Kazakhstan, February 26-28, 2015. Proceedings. R. Horne, editor. Communications in Computer and Information Science 514, 2015. bib | DOI ]
  2. Proceedings of the 4th International Workshop on Engineering Safety and Security Systems. J. Pang, Y. Liu and S. Mauw, editors. EPTCS 184, 2015. bib | from publisher ]

Journal Articles

  1. The consistency and complexity of multiplicative additive system virtual. R. Horne. Scientific Annals of Computer Science, 25(2):245-316, 2015. bib | URL | DOI ]
  2. Minimal type inference for Linked Data consumers. G. Ciobanu, R. Horne and V. Sassone. Journal of Logical and Algebraic Methods in Programming, 84(4):485-504, 2015. bib | URL | DOI ]
  3. Security analysis of socio-technical physical systems. G. Lenzini, S. Mauw and S. Ouchani. Computers and Electrical Engineering, 47:258–274, 2015. bib ]
  4. A new access control scheme for Facebook-style social networks. J. Pang and Y. Zhang. Computers & Security, 54():44-59, 2015. bib | preprint ]
  5. Formalizing provable anonymity in Isabelle⁄HOL. Y. Li and J. Pang. Formal Aspects of Computing, 27(2):255-282, 2015. bib | preprint ]
  6. Comparing distance bounding protocols: A critical mission supported by decision theory. G. Avoine, S. Mauw and R. Trujillo-Rasua. Computer Communications, 67:92–102, 2015. bib ]

Conference Proceedings

  1. Behavioural analysis of sessions using the calculus of structures. G. Ciobanu and R. Horne. In In Perspectives of System Informatics, 10th International Andrei Ershov Informatics Conference, PSI 2015, in Memory of Helmut Veith, Kazan and Innopolis, Russia, August 24-27, Springer, LNCS 9609, pp. 91-106, 2015. bib | URL | DOI ]
  2. FP-Block: usable web privacy by controlling browser fingerprinting. C. Torres, H. Jonker and S. Mauw. In Proc. 20th European Symposium On Research In Computer Security (ESORICS’15), Part II, Springer-Verlag, Lecture Notes in Computer Science 9327, pp. 3–19, 2015. bib ]
  3. Improving BDD-based attractor detection for synchronous Boolean networks. H. Qu, Q. Yuan, J. Pang and A. Mizera. In Proc. 7th Asia-Pacific Symposium on Internetware (Internetware’15), ACM Press, pp. xx-xx (to appear), 2015. bib | preprint ]
  4. Location prediction: Communities speak louder than friends. J. Pang and Y. Zhang. In Proc. 3rd ACM Conference on Online Social Networks (COSN’15), ACM Press, pp. 161-171, 2015. bib | preprint ]
  5. ASSA-PBN: An approximate steady-state analyser for probabilistic Boolean networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 13th International Symposium on Automated Technology for Verification and Analysis (ATVA’15), Springer-Verlag, Lecture Notes in Computer Science 9364, pp. 214-220, 2015. bib | preprint ]
  6. paraVerifier: An automatic framework for proving parameterized cache coherence protocols. Y. Li, J. Pang, Y. Lv, D. Fan, S. Cao, and K. Duan. In Proc. 13th International Symposium on Automated Technology for Verification and Analysis (ATVA’15), Springer-Verlag, Lecture Notes in Computer Science 9364, pp. 207-213, 2015. bib | preprint ]
  7. Activity tracking: A new attack on location privacy. X. Chen, A. Mizera and J. Pang. In Proc. 3rd IEEE Conference on Communications and Network Security (CNS’15), IEEE Computer Society, pp. 22-30, 2015. bib | preprint ]
  8. Cryptographic protocols for enforcing relationship-based access control policies. J. Pang and Y. Zhang. In Proc. 39th Annual IEEE Computers, Software & Applications Conference (COMPSAC’15), IEEE Computer Society, pp. 484-493, 2015. bib | preprint ]
  9. Event prediction with community leaders. J. Pang and Y. Zhang. In Proc. 10th Conference on Availability, Reliability and Security (ARES’15), IEEE Computer Society, pp. 238-243, 2015. bib | preprint ]
  10. Inferring friendship from check-in data of location-based social networks. R. Cheng, J. Pang and Y. Zhang. In Proc. 5th Workshop on Social Network Analysis in Applications (SNAA’15) (as part of 7th IEEE⁄ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’15)), ACM Press, pp. 1284-1291, 2015. bib | preprint ]
  11. Community-driven social influence analysis and applications. Y. Zhang and J. Pang. In Proc. Porc. 15th International Conference on Web Engineering (PhD Symposium) (ICWE’15), Springer-Verlag, Lecture Notes in Computer Science 9114, pp. 644-647, 2015. bib | preprint ]
  12. A logical approach to restricting access in online social networks. M. Cramer, J. Pang and Y. Zhang. In Proc. 20th ACM Symposium on Access Control Models and Technologies (SACMAT’15), ACM Press, pp. 75-86, 2015. bib | preprint ]
  13. Exploring communities for effective location prediction. J. Pang and Y. Zhang. In Proc. 24th World Wide Web Conference (Companion Volume) (WWW’15), ACM Press, pp. 87-88, 2015. bib | preprint ]
  14. Attack trees with sequential conjunction. R. Jhawar, B. Kordy, S. Mauw, S. Radomirović and R. Trujillo-Rasua. In Proc. 30th IFIP TC-11 International Information Security and Privacy Conference (IFIPSec’15), Springer-Verlag, IFIP AICT 455, pp. 339–353, 2015. bib ]
  15. Location-private interstellar communication. H. Jonker, S. Mauw and S. Radomirović. In Proc. 23rd Security Protocols Workshop, Springer-Verlag, LNCS 9379, pp. 105–115, 2015. bib ]
  16. Location-private interstellar communication (Transcript of Discussion). S. Mauw. In Proc. 23rd Security Protocols Workshop, Springer-Verlag, LNCS 9379, pp. 116–125, 2015. bib ]
  17. Generalizing multi-party contract signing. S. Mauw and S. Radomirović. In Proc. 4th Conference on Principles of Security and Trust (POST’15), Springer Verlag, LNCS 9036, pp. 156–175, 2015. bib ]
  18. StaDynA: Addressing the Problem of Dynamic Code Updates in the Security Analysis of Android Applications. Y. Zhauniarovich, M. Ahmad, O. Gadyatskaya, B. Crispo and F. Massacci. In Proceedings of ACM CODASPY’2015, ACM, 2015. bib ]
  19. Towards Black Box Testing of Android Apps. Y. Zhauniarovich, A. Philippov, O. Gadyatskaya, B. Crispo and F. Massacci. In Proc. of Software Assurance Workshop at the 10th International Conference on Availability, Reliability and Security (ARES), pp. 501–510, 2015. bib ]

Published in 2014

Edited Proceedings

  1. Proceedings of the 10th International Workshop on Security and Trust Management (STM 2014), Wroclaw, Poland, September 10-11, 2014. S. Mauw and C. Jensen, editors. Lecture Notes in Computer Science 8743, 2014. bib ]
  2. Proceedings of the 16th International Conference on Formal Engineering Methods. S. Merz and J. Pang, editors. Lecture Notes in Computer Science 8229, 2014. bib | from publisher ]
  3. Proceedings of the 3rd International Workshop on Engineering Safety and Security Systems. J. Pang and Y. Liu, editors. EPTCS 150, 2014. bib | from publisher ]
  4. Proceedings First International Workshop on Graphical Models for Security, GraMSec 2014, Grenoble, France, 12th April, 2014. B. Kordy, S. Mauw and W. Pieters, editors. EPTCS 148, 2014. bib | from publisher ]

Journal Articles

  1. A verified algebra for read-write Linked Data. R. Horne and V. Sassone. Sci. Comput. Program., 89:2–22, 2014. bib | DOI ]
  2. Special issue on software verification and testing. M.R. Mousavi and J. Pang. Science of Computer Programming, 95(3):273-274, 2014. bib | URL ]
  3. Attacks Generation by Detecting Attack Surfaces. S. Ouchani and G. Lenzini. Procedia Computer Science, 32(0):529 - 536, 2014. bib ]
  4. Constructing and comparing user mobility profiles. X. Chen, J. Pang and R. Xue. ACM Transactions on the Web, 8(4):article 21, 2014. bib | preprint ]
  5. Distance Bounding Facing Both Mafia and Distance Frauds. R. Trujillo-Rasua, B. Martin and G. Avoine. IEEE Transactions on Wireless Communications, 13(10):5690–5698, 2014. bib ]
  6. optPBN: an optimisation toolbox for probabilistic Boolean networks. P. Trairatphisan, A. Mizera, J. Pang, A.-A. Tantar and T. Sauter. PLOS ONE, 9(7):e98001, 2014. bib | preprint ]
  7. Preface: Foundational aspects of security. K. Chatzikokolakis, S.A. Mödersheim, C. Palamidessi and J. Pang. Journal of Computer Security, 22(2):201-202, 2014. bib | preprint ]
  8. Protecting query privacy in location-based services. X. Chen and J. Pang. GeoInformatica, 18(1):95-133, 2014. bib | preprint ]
  9. Model Checking with Fairness Assumptions using PAT. Y. Si, J. Sun, Y. Liu, J.S. Dong, J. Pang, S. Zhang and X. Yang. Frontiers of Computer Science, 8(1):1-16, 2014. bib | preprint ]
  10. Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. Journal of Logic and Computation, 24(1):55-87, 2014. bib | URL | DOI ]

Conference Proceedings

  1. On robustness of trust systems. Z. Jie, Y. Liu, S. Mauw and T. Muller. In Proc. 8th IFIP WG 11.11 International Conference on Trust Management (IFIPTM’14), IFIP, pp. 44–60, 2014. bib ]
  2. Secure Auctions Without Cryptography. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 7th conference on Fun with Algorithms (FUN’14), Springer, LNCS 8496, pp. 158-170, 2014. bib | URL | DOI ]
  3. Dynamic analysis of usage control policies. Y. Elrahaiby and J. Pang. In Proc. 11th Conference on Security and Cryptography (SECRYPT’14), SciTePress, pp. 88-100, 2014. bib | preprint ]
  4. MinUS: Mining user similarity with trajectory patterns. X. Chen, P. Kordy, R. Lv and J. Pang. In Proc. 7th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML⁄PKDD’14), Springer-Verlag, Lecture Notes in Computer Science 8726, pp. 436-439, 2014. bib | preprint ]
  5. A new access control scheme for Facebook-style social networks. J. Pang and Y. Zhang. In Proc. 9th Conference on Availability, Reliability and Security (ARES’14), IEEE Computer Society, pp. 1-10, 2014. bib | preprint ]
  6. Measuring user similarity with trajectory patterns: Principles and new metrics. X. Chen, R. Lv, X. Ma and J. Pang. In Proc. 16th Asia-Pacific Web Conference (APWeb’14), Springer-Verlag, Lecture Notes in Computer Science 8709, pp. 437-448, 2014. bib | preprint ]
  7. Model-checking based approaches to parameter estimation of gene regulatory networks. A. Mizera, J. Pang and Q. Yuan. In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS’14), IEEE Computer Society, pp. 206-209, 2014. bib | preprint ]
  8. Symbolic analysis of an electric vehicle charging protocol. L. Li, J. Pang, Y. Liu, J. Sun and J.S. Dong. In Proc. 19th IEEE Conference on Engineering of Complex Computer Systems (ICECCS’14), IEEE Computer Society, pp. 11-18, 2014. bib | preprint ]
  9. A Probabilistic Framework for Security Scenarios with Dependent Actions. B. Kordy, M. Pouly and P. Schweitzer. In Integrated Formal Methods (iFM 2014), Springer International Publishing Switzerland, LNCS 8739, pp. 256-271, 2014. bib ]
  10. A strand space approach to provable anonymity. Y. Li and J. Pang. In Proc. 2nd Workshop on Formal Techniques for Safety-Critical Systems (FTSCS’13), Springer-Verlag, Communications in Computer and Information Science 419, pp. 71-87, 2014. bib | preprint ]
  11. A symbolic algorithm for the analysis of robust timed automata. P. Kordy, R. Langerak, S. Mauw and J. Polderman. In Proc. 19th International Symposium on Formal Methods (FM’14), Springer Verlag, LNCS 8442, pp. 351-366, 2014. bib ]
  12. FSquaDRA: Fast Detection of Repackaged Applications. Y. Zhauniarovich, O. Gadyatskaya, B. Crispo, L.F. Spina and E. Moser. In Proceedings of 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec’2014), Springer, LNCS 8566, pp. 130-145, 2014. bib ]

Technical Reports

  1. Informaticaonderwijs aan Nederlandse Universiteiten in 2013 - State of the Art. J. Paredaens, L. Bijlsma, P. Boot, K. Bosschere, J. van den Herik, S. Mauw, S. Mullender, B. Preneel, W. Petegem and R. Verbij. Technical report, Quality Assurance Netherlands Universities, 2014. bib ]

Published in 2013

Journal Articles

  1. Location assurance and privacy in GNSS navigation. X. Chen, C. Harpes, G. Lenzini, S. Mauw and J. Pang. ERCIM News, 2013(94):11, 2013. bib ]
  2. Detecting Meaconing Attacks by analysing the Clock Bias of GNSS Receivers. D. Marnach, S. Mauw, M. Martins and C. Harpes. Artificial Satellites, Journal of Planetary Geodesy, 48(2):63–84, 2013. bib ]
  3. Special issue: Software verification and testing. M.R. Mousavi and J. Pang. Innovations in Systems and Software Engineering, 9(2):57-58, 2013. bib | URL ]
  4. Privacy and verifiability in voting systems: Methods, developments and trends. H.L. Jonker, S. Mauw and J. Pang. Computer Science Review, 10:1-30, 2013. bib | URL ]
  5. Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. Journal of Logic and Computation, 2013. bib | URL | DOI ]
  6. Recent development and biomedical applications of probabilistic Boolean networks. P. Trairatphisan, A. Mizera, J. Pang, A.-A. Tantar, J. Schneider and T. Sauter. Cell Communication and Signaling, 11:46, 2013. bib | URL ]
  7. An inductive approach to strand spaces. Y. Li and J. Pang. Formal Aspects of Computing, 25(4):465-501, 2013. bib | URL ]
  8. Design and formal verification of a certified email protocol with transparent TTP. Z. Liu, J. Pang and C. Zhang. Frontiers of Computer Science, 7(2):279-297, 2013. bib | URL ]
  9. Design and formal analysis of a group signature based electronic toll pricing system. X. Chen, G. Lenzini, S. Mauw and J. Pang. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 4(1):55-75, 2013. bib | URL ]

Conference Proceedings

  1. Non-interleaving Operational Semantics for Geographically Replicated Databases. G. Ciobanu and R. Horne. In 15th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing, SYNASC 2013, Timisoara, Romania, September 23-26, 2013, IEEE Computer Society, pp. 440–447, 2013. bib | DOI ]
  2. Complexity of Distance Fraud Attacks in Graph-Based Distance Bounding. R. Trujillo-Rasua. In Mobile and Ubiquitous Systems: Computing, Networking, and Services - 10th International Conference, MOBIQUITOUS 2013, Tokyo, Japan, December 2-4, 2013, pp. 289–302, 2013. bib ]
  3. Editorial message: Special track on software verification and testing. J. Pang and M.R. Mousavi. In Proc. 28th Symposium on Applied Computing (SAC’13), ACM Press, pp. 1186–1187, 2013. bib ]
  4. Modeling the German Legal Latitude Principles for Internet Voting Systems. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 5th conference on eParticipation (ePart 2013), Springer-Verlag, LNCS 8075, pp. 49-56, 2013. bib | preprint | from publisher ]
  5. Defining Verifiability in e-Auction Protocols. J. Dreier, H.L. Jonker and P. Lafourcade. In Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), ACM, pp. 547-552, 2013. bib | preprint | from publisher ]
  6. Verifiability in e-Auction protocols & Brandt’s protocol revisited. J. Dreier, J.-G. Dumas, H.L. Jonker and P. Lafourcade. In 1st Workshop on Hot Issues in Security Principles and Trust (HOTSPOT 2013), 2013. bib | preprint | from publisher ]
  7. DEMO: Demonstrating a trust framework for evaluating GNSS signal integrity. X. Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw and J. Pang. In Proc. 20th ACM Conference on Computer and Communications Security (CCS’13), ACM Press, pp. 1329-1332, 2013. bib | URL ]
  8. Verification of functional and non-functional requirements of web service composition. M. Chen, T.H. Tan, J. Sun, Y. Liu, J. Pang and X. Li. In Proc. 15th Conference on Formal Engineering Methods (ICFEM’13), Springer-Verlag, Lecture Notes in Computer Science 8144, pp. 313-328, 2013. bib | URL ]
  9. A balancing act: Parameter estimation for biological models with steady-state measurements. A. Mizera, J. Pang, T. Sauter and P. Trairatphisan. In Proc. 11th Conference on Computational Methods in Systems Biology (CMSB’13), Springer-Verlag, Lecture Notes in Bioinformatics 8130, pp. 253-254, 2013. bib | URL ]
  10. ADTool: Security Analysis with Attack–Defense Trees. B. Kordy, P. Kordy, S. Mauw and P. Schweitzer. In QEST, Springer, LNCS 8054, pp. 173-176, 2013. bib | from publisher ]
  11. Quantitative Questions on Attack–Defense Trees. B. Kordy, S. Mauw and P. Schweitzer. In ICISC, Springer, LNCS 7839, pp. 49–64, 2013. bib ]
  12. Unterstützung der juristisch-informatischen Kommunikation im Hinblick auf elektronische Wahlprotokolle. S. Neumann, A. Kahlert, M. Henning, H. Jonker and M. Volkamer. In Proc. 16. Internationales Rechtsinformatik Symposion (IRIS2013), Oesterreichische Computer Gesellschaft, 2013. bib | from publisher ]
  13. A Formal Derivation of Composite Trust. T. Muller and P. Schweitzer. In Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers, Springer, LNCS 7743, pp. 132-148, 2013. bib ]
  14. Enforcing privacy in the presence of others: Notions, formalisations and relations. N. Dong, H.L. Jonker and J. Pang. In Proc. 18th European Symposium on Research in Computer Security (ESORICS’13), Springer-Verlag, Lecture Notes in Computer Science 8134, pp. 499-516, 2013. bib | URL ]
  15. A trust framework for evaluating GNSS signal integrity. X. Chen, G. Lenzini, M. Martins, S. Mauw and J. Pang. In Proc. 26th IEEE Computer Security Foundations Symposium (CSF’13), IEEE Computer Society, pp. 179-192, 2013. bib | URL ]
  16. Mathematical modelling of the Platelet-Derived Growth Factor (PDGF) signalling pathway. A. Mizera, J. Pang, T. Sauter and P. Trairatphisan. In Proc. 4th Workshop on Computational Models for Cell Processes (CompMod’13), Electronic Proceedings in Theoretical Computer Science 116, pp. 35, 2013. bib | URL ]
  17. Constructing and comparing user mobility profiles for location-based services. X. Chen, J. Pang and R. Xue. In Proc. 28th ACM Symposium on Applied Computing (SAC’13), ACM, pp. 261-266, 2013. bib | URL ]
  18. Exploring dependency for query privacy protection in location-based services. X. Chen and J. Pang. In Proc. 3rd ACM Conference on Data and Application Security and Privacy (CODASPY’13), ACM, pp. 37-47, 2013. bib | URL ]
  19. Post-hoc analysis of user traceability in electronic toll collection systems. X. Chen, D. Fonkwe and J. Pang. In Proc. 7th Workshop on Data Privacy Management (DPM’12), Springer-Verlag, Lecture Notes in Computer Science 7731, pp. 29-42, 2013. bib | URL ]
  20. Incentives and Rationality in Security of Interaction Protocols. W. Jamroga, M. Melissen and H. Schnoor. In PRIMA 2013: Principles and Practice of Multi-Agent Systems. Proceedings, 2013. bib ]
  21. Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders). S. Kramer. In Proc. 6th Workshop on Intuitionistic Modal Logic and Applications, Electronic Notes in Theoretical Computer Science 300, pp. 47-70, 2013. bib ]

PhD Theses

  1. Attack–Defense Trees. . Schweitzer. PhD thesis, University of Luxembourg, 2013. bib ]
  2. Enforced Privacy: from Practice to Theory. . Dong. PhD thesis, University of Luxembourg, 2013. bib ]
  3. A Formal Analysis of Trust Operations: Trust Aggregation, Trust Chaining and Logical Trust Operations. . Muller. PhD thesis, University of Luxembourg, 2013. bib ]
  4. Game-theory and Logic for Non-repudiation Protocols and Attack Analysis. . Melissen. PhD thesis, University of Luxembourg, 2013. bib ]

Published in 2012

Books

  1. Operational Semantics and Verification of Security Protocols. C. Cremers and S. Mauw. Springer-Verlag, , 2012. bib ]

Book Chapters

  1. Specification and Verification of Multi-Agent Systems. W. Jamroga and W. Penczek. In Lectures on Logic and Computation, Springer, LNCSpp. 210–263, 2012. bib ]
  2. Computational methods for quantitative submodel comparison. A. Mizera, E. Czeizler and I. Petre. In Biomolecular Information Processing. From Logic Systems to Smart Sensors and Actuators, Wiley-VCH Verlag GmbH, pp. 323–346, 2012. bib ]
  3. Location-Based Services: Privacy, Security and Assurance. H.L. Jonker, S. Mauw and J. Pang. In Digital Enlightenment Yearbook 2012, IOS Press, pp. 235–244, 2012. bib | URL ]

Edited Proceedings

  1. Proceedings of the 5th Workshop on Logical Aspects of Multi-Agent Systems LAMAS’2012. V. Goranko and W. Jamroga, editors. 2012. bib ]

Journal Articles

  1. Tracing where and who provenance in Linked Data: A calculus. M. Dezani-Ciancaglini, R. Horne and V. Sassone. Theor. Comput. Sci., 464:113–129, 2012. bib | DOI ]
  2. Input Online Review Data and Related Bias in Recommender Systems. S. Piramuthu, G. Kapoor, W. Zhou and S. Mauw. Decision Support Systems, 53(3):418–424, 2012. bib ]
  3. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. Journal of Autonomous Agents and Multi-Agent Systems, 2012. bib ]
  4. Quantitative analysis of the self-assembly strategies of intermediate filaments from tetrameric vimentin. E. Czeizler, A. Mizera, E. Czeizler, R.-J. Back, J.E. Eriksson and I. Petre. IEEE⁄ACM Transactions on Computational Biology and Bioinformatics, 9(3):885–898, 2012. bib ]
  5. Self-assembly models of variable resolution. A. Mizera, E. Czeizler and I. Petre. Transactions on Computational Systems Biology, 7625:181–203, 2012. bib ]
  6. A trust-augmented voting scheme for collaborative privacy management. Y. Sun, C. Zhang, J. Pang, B. Alcalde and S. Mauw. Journal of Computer Security, 20(4):437–459, 2012. bib | URL ]
  7. Probabilistic model checking of the PDGF signaling pathway. Q. Yuan, P. Trairatphisan, J. Pang, S. Mauw, M. Wiesinger and T. Sauter. Transactions on Computational Systems Biology, 7625:151–180, 2012. bib | URL ]
  8. Game-based verification of contract signing protocols with minimal messages. Y. Zhang, C. Zhang, J. Pang and S. Mauw. Innovations in Systems and Software Engineering, 8(2):111–124, 2012. bib | URL ]
  9. Attribute Decoration of Attack–Defense Trees. A. Bagnato, B. Kordy, P. Meland and P. Schweitzer. International Journal of Secure Software Engineering (IJSSE), 3(2):1–35, 2012. bib | DOI ]

Conference Proceedings

  1. Characterising probabilistic alternating simulation for concurrent games. C. Zhang and J. Pang. In Proc. 14th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE’20), IEEE Computer Society, pp. 121-128, 2012. bib ]
  2. Detecting Meaconing Attacks by analysing the Clock Bias of GNSS Receivers. D. Marnach, S. Mauw, M. Martins and C. Harpes. In European Navigation Conference (ENC 2012), 2012. bib ]
  3. Constructing Optimistic Multi-party Contract Signing Protocols. B. Kordy and S. Radomirović. In Computer Security Foundations (CSF 2012), IEEE, pp. 215-229, 2012. bib ]
  4. Concepts, Agents, and Coalitions in Alternating Time. W. Jamroga. In Proceedings of ECAI, IOS Press, pp. 438–443, 2012. bib ]
  5. State and Path Effectivity Models for Logics of Multi-Player Games. V. Goranko and W. Jamroga. In Proceedings of AAMAS, pp. 1123–1130, 2012. bib ]
  6. Distance-Based Rules for Weighted Judgment Aggregation (Extended Abstract). M. Slavkovik and W. Jamroga. In Proceedings of AAMAS, pp. 1405-1406, 2012. bib ]
  7. Fairness in Non-Repudiation Protocols. W. Jamroga, S. Mauw and M. Melissen. In Proceedings of the 7th International Workshop on Security and Trust Management (STM 2011), Springer, LNCS 7170, pp. 122–139, 2012. bib | URL ]
  8. A group signature based electronic toll pricing system. X. Chen, G. Lenzini, S. Mauw and J. Pang. In Proc. 7th Conference on Availability, Reliability and Security (ARES’12), IEEE Computer Society, pp. 85–93, 2012. bib | URL ]
  9. Comparative analysis of clustering protocols with probabilistic model checking. Q. Li, P. Schaffer, J. Pang and S. Mauw. In Proc. 6th IEEE Symposium on Theoretical Aspects of Software Engineering (TASE’12), IEEE Computer Society, pp. 249–252, 2012. bib | URL ]
  10. Measuring query privacy in location-based services. X. Chen and J. Pang. In Proc. 2nd ACM Conference on Data and Application Security and Privacy (CODASPY’12), ACM, pp. 49–60, 2012. bib | URL ]
  11. An algorithm for probabilistic alternating simulation. C. Zhang and J. Pang. In Proc. 38th Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM’12), Springer-Verlag, Lecture Notes in Computer Science 7147, pp. 431–442, 2012. bib | URL ]
  12. Formal analysis of privacy in an eHealth protocol. N. Dong, H.L. Jonker and J. Pang. In Proc. 17th European Symposium on Research in Computer Security (ESORICS’12), Springer-Verlag, LNCS 7459, pp. 325–342, 2012. bib | from publisher ]
  13. Random Block Verification: Improving the Norwegian Electoral Mix Net. D. Demirel, H. Jonker and M. Volkamer. In EVOTE 2012, Gesellschaft für Informatik, Lecture Notes in Informatics 205, pp. 65–78, 2012. bib | URL ]
  14. Insider attacks and privacy of RFID protocols. T. van Deursen and S. Radomirović. In EuroPKI, Springer, LNCS 7163, pp. 91–105, 2012. bib ]
  15. Computational Aspects of Attack–Defense Trees. B. Kordy, M. Pouly and P. Schweitzer. In Security & Intelligent Information Systems, Springer, LNCS 7053, pp. 103–116, 2012. bib | URL ]
  16. Challenges in eHealth: from enabling to enforcing privacy. N. Dong, H.L. Jonker and J. Pang. In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems (FHIES’11), Springer-Verlag, LNCS 7151, pp. 195–206, 2012. bib ]

Technical Reports

  1. Quantitative Questions on Attack-Defense Trees. B. Kordy, S. Mauw and P. Schweitzer. Technical report, University of Luxembourg, 2012. bib | from publisher ]
  2. A Logic of Interactive Proofs. S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  3. Logic of Negation-Complete Interactive Proofs (Formal Theory of Epistemic Deciders). S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  4. Logic of Non-Monotonic Interactive Proofs (Formal Theory of Temporary Knowledge Transfer). S. Kramer. Technical report, University of Luxembourg, 2012. bib ]
  5. Parametric Constructive Kripke-Semantics for Standard Multi-Agent Belief and Knowledge (Knowledge As Unbiased Belief). S. Kramer and J. Sack. Technical report, University of Luxembourg, 2012. bib ]

Miscellaneous

  1. Editorial message: Special track on software verification and testing. J. Pang and M.R. Mousavi. 2012. bib ]

Published in 2011

Edited Proceedings

  1. M4M’2011 and LAMAS’2011. H. van Ditmarsch, D. Fernández Duque, V. Goranko, W. Jamroga and M. Ojeda-Aciego, editors. Electronic Notes in Theoretical Computer Science 278, 2011. bib ]

Journal Articles

  1. Fast leader election in anonymous rings with bounded expected delay. R. Bakhshi, J. Endrullis, W.J. Fokkink and J. Pang. Information Processing Letters, 111(17):864–870, 2011. bib ]

Conference Proceedings

  1. Alternating Epistemic Mu-Calculus. N. Bulling and W. Jamroga. In Proceedings of IJCAI-11, pp. 109–114, 2011. bib ]
  2. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. In Proceedings of AAMAS2011, pp. 727–734, 2011. bib ]
  3. Comparing Variants of Strategic Ability. W. Jamroga and N. Bulling. In Proceedings of IJCAI-11, pp. 252–257, 2011. bib ]
  4. Agents, Actions and Goals in Dynamic Environments. P. Novak and W. Jamroga. In Proceedings of IJCAI-11, pp. 313–318, 2011. bib ]
  5. Distance-based Judgment Aggregation of Three-valued Judgments with Weights. M. Slavkovik and W. Jamroga. In Proceedings of the IJCAI Workshop on Social Choice and Artificial Intelligence, pp. 81–86, 2011. bib ]
  6. Bulletin boards in voting systems: Modelling and measuring privacy. H. Jonker and J. Pang. In Proc. 6th International Conference on Availability, Reliability and Security, IEEE Computer Society, pp. 294–300, 2011. bib | URL ]
  7. An inductive approach to provable anonymity. Y. Li and J. Pang. In Proc. 6th Conference on Availability, Reliability and Security (ARES’11), IEEE Computer Society, pp. 454–459, 2011. bib | URL ]
  8. Verification of a key-chain based TTP transparent CEM protocol. Z. Liu, J. Pang and C. Zhang. In Proc. 3rd Workshop on Harnessing Theories for Tool Support in Software (TTSS’10), Elsevier, Electronic Notes in Theoretical Computer Science 274, pp. 51–65, 2011. bib | URL ]
  9. A trust-augmented voting scheme for collaborative privacy management. Y. Sun, C. Zhang, J. Pang, B. Alcalde and S. Mauw. In Proc. 6th Workshop on Security and Trust Management (STM’10), Springer-Verlag, LNCS 6710, pp. 132–146, 2011. bib | URL ]
  10. On combining state space reductions with global fairness assumptions. S. Zhang, J. Sun, J. Pang, Y. Liu and J.-S. Dong. In Proc. 17th Symposium on Formal Methods (FM’11), Springer-Verlag, LNCS 6664, pp. 432–447, 2011. bib | URL ]
  11. A Study of the PDGF Signaling Pathway with PRISM. Q. Yuan, J. Pang, S. Mauw, P. Trairatphisan, M. Wiesinger and T. Sauter. In 3rd International Workshop on Computational Models for Cell Processes (CompMod 2011), Electronic Proceedings in Theoretical Computer Science 67, pp. 65–81, 2011. bib | URL ]
  12. Selective Location Blinding using Hash Chains. G. Lenzini, S. Mauw and J. Pang. In Proc. 19th Security Protocols Workshop, Springer-Verlag, LNCS 7114, pp. 132–141, 2011. bib ]
  13. Selective Location Blinding using Hash Chains (Transcript of Discussion). S. Mauw. In Proc. 19th Security Protocols Workshop, Springer-Verlag, LNCS 7114, pp. 142–149, 2011. bib ]
  14. A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. S. Kramer and P.Y.A. Ryan. In Proceedings of the RE-affiliated Workshop on Requirements Engineering for Electronic Voting Systems, IEEE, pp. 9–21, 2011. bib ]
  15. mCarve: Carving attributed dump sets. T. van Deursen, S. Mauw and S. Radomirović. In 20th USENIX Security Symposium, USENIX Association, pp. 107–121, 2011. bib | URL ]
  16. 50 Ways to Break RFID Privacy. T. van Deursen. In Privacy and Identity 2010, Springer, IFIP AICT 352, pp. 192–205, 2011. bib | URL ]
  17. Analysis of a receipt-free auction protocol in the applied pi calculus. N. Dong, H.L. Jonker and J. Pang. In Proc. 7th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 6561, pp. 223–238, 2011. bib | URL ]
  18. Foundations of Attack–Defense Trees. B. Kordy, S. Mauw, S. Radomirović and P. Schweitzer. In Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust (FAST 2010), Springer-Verlag, LNCS 6561, pp. 80–95, 2011. bib | URL | DOI ]
  19. Semantics of Trust. T. Muller. In Proceedings of the 7th international Workshop on Formal Aspects in Security and Trust (FAST 2010), Springer-Verlag, LNCS 6561, pp. 141–156, 2011. bib ]
  20. The Generative Capacity of the Lambek-Grishin Calculus: A New Lower Bound. M. Melissen. In Proceedings of Formal Grammar 2009, Springer, LNCS 5591, pp. 118–132, 2011. bib | URL | from publisher ]
  21. Doubtful Deviations and Farsighted Play. W. Jamroga and M. Melissen. In Progress in Artificial Intelligence, Proceedings of the 15th Portuguese Conference on Artificial Intelligence, Springer, LNCS 7026, pp. 506–520, 2011. bib | URL | from publisher ]
  22. Operational Semantics for SPARQL Update. R. Horne, V. Sassone and N. Gibbins. In The Semantic Web - Joint International Semantic Technology Conference, JIST 2011, Hangzhou, China, December 4-7, 2011. Proceedings, Springer, Lecture Notes in Computer Science 7185, pp. 242–257, 2011. bib | DOI ]

PhD Theses

  1. Security of RFID Protocols. . van Deursen. PhD thesis, University of Luxembourg, 2011. bib ]

Published in 2010

Book Chapters

  1. Model Checking Logics of Strategic Ability: Complexity. N. Bulling, J. Dix and W. Jamroga. In Specification and Verification of Multi-Agent Systems, Springer, pp. 125–159, 2010. bib ]
  2. Fair Exchange. .M. Dashti and S. Mauw. In Handbook of Financial Cryptography and Security, Chapmand and Hall⁄CRC, pp. 109–132, 2010. bib ]

Edited Proceedings

  1. Proceedings of the 3rd Workshop on Logical Aspects of Multi-Agent Systems (LAMAS 2010). V. Goranko and W. Jamroga, editors. 2010. bib ]
  2. Computational Logic in Multi-Agent Systems. Proceedings of CLIMA XI. J. Dix, J. Leite, G. Governatori and W. Jamroga, editors. LNCS 6245, 2010. bib ]

Journal Articles

  1. Verifying Agents with Memory Is Harder than It Seemed. N. Bulling and W. Jamroga. AI Communications, 23:380–403, 2010. bib ]
  2. Coalition Description Logic for Individuals. İ. Seylan and W. Jamroga. Electronic Notes in Theoretical Computer Science, 262:231–248, 2010. bib ]
  3. A Comparison of Semantic Models for Noninterference. R. van der Meyden and C. Zhang. Theoretical Computer Science, 411:4123–4147, 2010. bib ]
  4. The optimal size of a permit market. F.C. Krysiak and P. Schweitzer. Journal of Environmental Economics and Management, 60(2):133–143, 2010. bib | URL | DOI ]
  5. Connecting face hitting sets in planar graphs. P. Schweitzer and P. Schweitzer. Information Processing Letters, 111(1):11–15, 2010. bib | URL | DOI ]

Conference Proceedings

  1. Verifying Agents with Memory Is Harder than It Seemed. N. Bulling and W. Jamroga. In Proceedings of AAMAS2010, pp. 633–640, 2010. bib ]
  2. Reasoning about Strategies of Multi-Agent Programs. M. Dastani and W. Jamroga. In Proceedings of AAMAS2010, pp. 625–632, 2010. bib ]
  3. Strategic Games and Truly Playable Effectivity Functions. V. Goranko, W. Jamroga and P. Turrini. In Proceedings of EUMAS2010, 2010. bib ]
  4. Comparing Variants of Strategic Ability. W. Jamroga and N. Bulling. In Proceedings of EUMAS2010, 2010. bib ]
  5. Towards a Model for Security and Privacy in the Internet of Things. S. Radomirović. In 1st International Workshop on the Security of the Internet of Things (SecIoT’10), 2010. bib ]
  6. Anonymity and Verifiability in Voting: Understanding (Un)Linkability. L. Langer, H. Jonker and W. Pieters. In Proc. 12th Conference on Information and Communications Security (ICICS’10), Springer-Verlag, LNCS 6476, pp. 296–310, 2010. bib | URL | DOI ]
  7. Versatile Pret a Voter: Handling Multiple Election Methods with a Unified Interface. Z. Xia, C. Culnane, J. Heather, H. Jonker, P. Ryan, S. Schneider and S. Srinivasan. In Proc. IndoCrypt, Springer-Verlag, LNCS 6498, pp. 98–114, 2010. bib | URL | DOI ]
  8. Anonymity in Voting Revisited. H. Jonker and W. Pieters. In Towards Trustworthy Elections, pp. 216–230, 2010. bib | URL | from publisher ]
  9. The Complexity of Synchronous Notions of Information Flow Security. F. Cassez, .R. der Meyden and C. Zhang. In Proceedings of FoSSaCS 2010, pp. 282–296, 2010. bib ]
  10. Extending a key-chain based certified email protocol with transparent TTP. Z. Liu, J. Pang and C. Zhang. In Proc. 6th IEEE⁄IFIP Symposium on Trusted Computing and Communications, IEEE Computer Society, pp. 630–636, 2010. bib | URL ]
  11. Regular Expressions with Parallel Composition modulo Bisimilarity. J. Baeten, B. Luttik, T. Muller and P. van Tilburg. In Proc. 17th International Workshop on Expressiveness in Concurrency, Electronic Proceedings in Theoretical Computer Science 41, pp. 1–15, 2010. bib | from publisher ]
  12. Security protocols for Secret Santa. S. Mauw, S. Radomirović and P.Y. Ryan. In Proc. 18th Security Protocols Workshop, Springer-Verlag, Lecture Notes in Computer Science 7601, pp. 175–184, 2010. bib | URL ]
  13. Security protocols for Secret Santa (Transcript of Discussion). S. Mauw. In Proc. 18th Security Protocols Workshop, Springer-Verlag, Lecture Notes in Computer Science 7601, pp. 185–190, 2010. bib ]
  14. On probabilistic alternating simulations. C. Zhang and J. Pang. In Proc. 6th IFIP Conference on Theoretical Computer Science, IFIP International Federation for Information Processing, IFIP AICT 323, pp. 71–85, 2010. bib | URL ]
  15. Brief announcement: Asynchronous bounded expected delay networks. R. Bakhshi, J. Endrullis, W.J. Fokkink and J. Pang. In Proc. 29th Annual ACM Symposium on Principles of Distributed Computing, ACM, pp. 392–393, 2010. bib | URL ]
  16. Model checking round-based distributed algorithms. X. An and J. Pang. In Proc. 15th IEEE Conference on Engineering of Complex Computer Systems, IEEE Computer Society, pp. 127–135, 2010. bib | URL ]
  17. Contextual Biometric-based Authentication for Ubiquitous Services. I. Buhan, G. Lenzini and S. Radomirović. In 7th International Conference on Ubiquitous Intelligence and Computing (UIC 2010), Springer, LNCS 6406, pp. 680–693, 2010. bib | DOI ]
  18. EC-RAC: Enriching a Capacious RFID Attack Collection. T. van Deursen and S. Radomirović. In 6th Workshop on RFID Security (RFIDSec 2010), Springer, LNCS 6370, pp. 75–90, 2010. bib | URL | DOI ]
  19. Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent. B. Kordy, S. Mauw, M. Melissen and P. Schweitzer. In Proceedings of the Conference on Decision and Game Theory for Security (GameSec 2010), Springer, LNCS 6442, pp. 245–256, 2010. bib | URL ]
  20. Trusted Third Party, Who Are You?. B. Alcalde. In Short Paper Proceedings of the Fourth IFIP WG11.11 International Conference on Trust Management (IFIPTM 2010), Information Processing Society of Japan, pp. 49–56, 2010. bib ]
  21. Abstracting Audit Data for Lightweight Intrusion Detection. W. Wei, X. Zhang and G. Pitsilis. In Sixth International Conference on Information Systems Security, Springer-Verlag, LNCS 6503, 2010. bib | DOI ]

Published in 2009

Book Chapters

  1. Discovering the core security requirements of DRM systems by means of objective trees. H.L. Jonker and S. Mauw. In Handbook of Research on Secure Multimedia Distribution, IGI Global, pp. 71–85, 2009. bib ]

Journal Articles

  1. A formal framework for quantifying voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. Journal of Algorithms in Cognition, Informatics and Logic, 64(2-3):89–105, 2009. bib | URL ]
  2. On a new formal proof model for RFID location privacy. T. van Deursen and S. Radomirović. Information Processing Letters, 110(2):57–61, 2009. bib | DOI ]
  3. What Agents Can Probably Enforce. N. Bulling and W. Jamroga. Fundamenta Informaticae, 93(1-3):81–96, 2009. bib ]

Conference Proceedings

  1. Algebraic Attacks on RFID Protocols. T. van Deursen and S. Radomirović. In Information Security Theory and Practices. Smart Devices, Pervasive Systems, and Ubiquitous Networks (WISTP’09), Springer, LNCS 5746, 2009. bib | URL ]
  2. Secure ownership and ownership transfer in RFID systems. T. van Deursen, S. Mauw, S. Radomirović and P. Vullers. In Proc. 14th European Symposium On Research In Computer Security (ESORICS’09), Springer, LNCS 5789, pp. 637–654, 2009. bib | URL ]
  3. Improving Automatic Verification of Security Protocols with XOR. X. Chen, T. van Deursen and J. Pang. In Proc. 11th International Conference on Formal Engineering Methods (ICFEM’09), Springer-Verlag, LNCS 5885, pp. 107–126, 2009. bib | URL ]
  4. A Rewrite Approach for Pattern Containment. B. Kordy. In Recent Trends in Algebraic Development Techniques, Springer-Verlag, pp. 236–250, 2009. bib ]
  5. An algebra for trust dilution and trust fusion. B. Alcalde and S. Mauw. In Proc. 6th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 5983, pp. 4–20, 2009. bib ]
  6. Game-based verification of multi-party contract signing protocols. Y. Zhang, C. Zhang, J. Pang and S. Mauw. In Proc. 6th Workshop on Formal Aspects in Security and Trust, Springer-Verlag, LNCS 5983, pp. 186–200, 2009. bib | URL ]
  7. How to work with honest but curious judges? (preliminary report). J. Pang and C. Zhang. In Proc. 7th International Workshop on Security Issues in Concurrency, Electronic Proceedings in Theoretical Computer Science 7, pp. 31–45, 2009. bib | URL ]
  8. Verification of population ring protocols in PAT. Y. Liu, J. Pang, J. Sun and J. Zhao. In Proc. 3rd IEEE Symposium on Theoretical Aspects of Software Engineering, IEEE Computer Society, pp. 81–89, 2009. bib | URL ]
  9. PAT: Towards flexible verification under fairness. J. Sun, Y. Liu, J.-S. Dong and J. Pang. In Proc. 21th International Conference on Computer Aided Verification, Springer-Verlag, LNCS 5643, pp. 709–714, 2009. bib | URL ]
  10. Measuring voter-controlled privacy. H.L. Jonker, S. Mauw and J. Pang. In Proc. 4th International Conference on Availability, Reliability and Security, IEEE Computer Society, pp. 289–298, 2009. bib | URL ]
  11. Towards a Decision Model Based on Trust and Security Risk Management. B. Alcalde, E. Dubois, S. Mauw, N. Mayer and S. Radomirović. In Proc. 7th Australasian Information Security Conference - AISC’09, Australian Computer Society, Conferences in Research and Practice in Information Technology (CRPIT) 98, pp. 61–69, 2009. bib ]
  12. Minimal message complexity of asynchronous multi-party contract signing. S. Mauw, S. Radomirović and T.M. Dashti. In Proceedings of the 22nd IEEE Computer Security Foundations Symposium (CSF’09), IEEE Computer Society, pp. 13–25, 2009. bib | URL ]
  13. Security of RFID Protocols – A Case Study. T. van Deursen and S. Radomirović. In Proc. 4th International Workshop on Security and Trust Management (STM’08), Elsevier, ENTCS 244, pp. 41–52, 2009. bib | URL | DOI ]
  14. Model Checking ATL$^+$ Is Harder than It Seemed. N. Bulling and W. Jamroga. In Proceedings of EUMAS’09, 2009. bib ]
  15. Rational Play and Rational Beliefs under Uncertainty. N. Bulling and W. Jamroga. In Proceedings of AAMAS’09, pp. 257–264, 2009. bib ]
  16. Reasoning about Strategic Properties of Multi-Agent Programs. N. Bulling and W. Jamroga. In Proceedings of EUMAS2009, 2009. bib ]
  17. Easy Yet Hard: Model Checking Strategies of Agents. W. Jamroga. In Computational Logic in Multi-Agent Systems: Proceedings of CLIMA IX, LNCS 5405, pp. 1–12, 2009. bib ]
  18. Code Patterns for Agent Oriented Programming. P. Novák and W. Jamroga. In Proceedings of AAMAS’09, pp. 105–112, 2009. bib ]
  19. Code Patterns for Agent Oriented Programming (Extended Abstract). P. Novák and W. Jamroga. In Proceedings of BNAIC’09, 2009. bib ]
  20. Coalition Description Logic for Individuals. İ. Seylan and W. Jamroga. In Proceedings of the 6th Workshop on Methods for Modalities M4M-6, pp. 146–162, 2009. bib ]
  21. Description Logic for Coalitions. İ. Seylan and W. Jamroga. In Proceedings of AAMAS’09, pp. 425–432, 2009. bib ]

PhD Theses

  1. Security Matters: Privacy in Voting and Fairness in Digital Exchange. H.L. Jonker. PhD thesis, Eindhoven University of Technology and University of Luxembourg, 2009. bib ]

Technical Reports

  1. Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2009. bib | URL ]
  2. Attacks on RFID protocols (version 1.1). T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2009. bib | URL ]
  3. Towards a toolkit for efficient and flexible verification under fairness. J. Sun, Y. Liu, J.-S. Dong and J. Pang. Technical report (TRB2/09), National University of Singapore, School of Computing, 2009. bib ]
  4. What Agents Can Probably Enforce. N. Bulling and W. Jamroga. Technical report (IfI-09-04), Clausthal University of Technology, 2009. bib ]
  5. Model Checking ATL$^+$ is Harder than It Seemed. W. Jamroga and N. Bulling. Technical report (IfI-09-13), Clausthal University of Technology, 2009. bib ]

Miscellaneous

  1. Modeling, Verification, and Strategic Reasoning in Multi-Agent Systems. W. Jamroga. 2009. bib ]

Published in 2008

Edited Proceedings

  1. Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings. S. Mjølsnes, S. Mauw and S.K. Katsikas, editors. LNCS 5057, 2008. bib ]
  2. Special issue on Security and Trust. S. Mauw, F. Massacci and P.F. editors), editors. 2008. bib ]

Journal Articles

  1. A framework for compositional verification of security protocols. S. Andova, C.J.F. Cremers, K. Gjøsteen, S. Mauw, S.F. Mjølsnes and S. Radomirović. Information and Computation, 206:425–459, 2008. bib | URL ]
  2. On automatic verification of self-stabilizing population protocols. J. Pang, Z. Luo and Y. Deng. Frontiers of Computer Science in China, 2(4):357–367, 2008. bib | URL ]
  3. Is timed branching bisimilarity a congruence indeed?. W.J. Fokkink, J. Pang and A.J. Wijs. Fundamenta Informaticae, 87(3-4):287–311, 2008. bib | URL ]

Conference Proceedings

  1. Leader election in anonymous rings: Franklin goes probabilistic. R. Bakhshi, W.J. Fokkink, J. Pang and .J.C. de Pol. In Proc. 5th IFIP Conference on Theoretical Computer Science, Springer-Verlag, IFIP International Federation for Information Processing 273, pp. 57–72, 2008. bib | URL ]
  2. On automatic verification of self-stabilizing population protocols. J. Pang, Z. Luo and Y. Deng. In Proc. 2nd IEEE Symposium on Theoretical Aspects of Software Engineering, IEEE Computer Society, pp. 185–192, 2008. bib | URL ]
  3. Chosen-name attacks: An overlooked class of type-flaw attacks. P. Ceelen, S. Mauw and S. Radomirović. In Proceedings of the 3rd International Workshop on Security and Trust Management (STM 2007), ENTCS 197, pp. 31–43, 2008. bib | URL ]
  4. Rights Management for Role-Based Access Control. B. Bouwman, S. Mauw and M. Petkovic. In Fifth Annual IEEE Consumer Communications & Networking Conference 2008 (CCNC’08), IEEE, pp. 1085–1090, 2008. bib | URL ]
  5. Hedaquin: A reputation-based health data quality indicator. T. van Deursen, P. Koster and M. Petkovic. In Proc. 3rd International Workshop on Security and Trust Management (STM’07), ENTCS 197, pp. 159–167, 2008. bib | URL ]
  6. Untraceability of RFID Protocols. T. van Deursen, S. Mauw and S. Radomirović. In Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks (WISTP’08), Springer, LNCS 5019, pp. 1–15, 2008. bib | URL ]
  7. Reliable Personal Health Records. T. van Deursen, P. Koster and M. Petković. In eHealth Beyond the Horizon – Get IT There – Proceedings of MIE2008 – The XXIst International Congress on the European Federation for Medical Informatics, IOS Press, Studies in Health Technology and Informatics 136, pp. 484–489, 2008. bib | URL ]
  8. Security of an RFID Protocol for Supply Chains. T. van Deursen and S. Radomirović. In Proc. 1st Workshop on Advances in RFID (AIR’08), IEEE Computer Society, pp. 568–573, 2008. bib | URL ]

Technical Reports

  1. On a new formal proof model for RFID Location Privacy. T. van Deursen and S. Radomirović. Technical report, University of Luxembourg, 2008. bib | URL ]

Miscellaneous

  1. Towards a Decision Model Based on Trust and Security Risk Management in e-Services. B. Alcalde, E. Dubois, S. Mauw, N. Mayer and S. Radomirović. 2008. bib ]
  2. Vulnerabilities in RFID protocols due to algebraic properties. T. van Deursen and S. Radomirović. 3rd Benelux Workshop on Information and System Security, 2008. bib ]

Published in 2007

Book Chapters

  1. Core security requirements of DRM systems. H.L. Jonker and S. Mauw. In Digital Rights Management – An Introduction, ICFAI University Press, pp. 73–90, 2007. bib | URL ]

Conference Proceedings

  1. Data anonymity in the FOO voting scheme. S. Mauw, J.H.S. Verschuren and E.P. de Vink. In Second International Workshop on Views On Designing Complex Architectures (VODCA 2006), ENTCS 168, pp. 5–28, 2007. bib ]
  2. Compliance of RIES to the proposed e-Voting protection profile. H. Jonker and M. Volkamer. In VOTE-ID 2007, LNCS 4896, pp. 50–61, 2007. bib ]
  3. A Certified Email Protocol Using Key Chains. J. Cederquist, T.M. Dashti and S. Mauw. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops - Volume 01 (AINAW’07), IEEE Computer Society, pp. 525–530, 2007. bib | URL ]

Miscellaneous

  1. Vote buying revisited: implications for receipt-freeness. W. Pieters and H. Jonker. 2007. bib | from publisher ]

Generated using BibHTML by Hugo Jonker, based on the BiblioPhile PHP BibTex parser.