Current Projects
Enforced Privacy
International Conference and Workshop Proceedings
-
Analysis of a receipt-free auction protocol in the applied pi calculus.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 7th Workshop on Formal Aspects in Security and Trust - FAST'10,
Lecture Notes in Computer Science 6561,
pp. 223-238 2011
©Springer-Verlag, 2011.
[ full version |
proverif code ]
-
Challenges in eHealth: from enabling to enforcing privacy.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems - FHIES'11,
Lecture Notes in Computer Science 7151, pp. 195-206.
©Springer-Verlag, 2012.
-
A foul adversary: bribery, extortion and blackmail (Abstract).
Naipeng Dong,
and Tim Muller.
In Joint Symposion on Security & Intelligent Information Systems - S&IIS'11, 2011.
-
Formal analysis of privacy in an eHealth protocol.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 17th European Symposium on Research in Computer Security - ESORICS'12,
Lecture Notes in Computer Science 7459, pp. 325-342.
©Springer-Verlag, 2012.
-
Enforcing privacy in the presence of others: Notions, formalisations and relations.
Naipeng Dong, Hugo Jonker,
and Jun Pang.
In Proc. 18th European Symposium on Research in Computer Security - ESORICS'13,
Lecture Notes in Computer Science.
©Springer-Verlag, 2013. (To appear)
Technical Reports