
 
    
      
Current Projects
Enforced Privacy
International Conference and Workshop Proceedings
- 
Analysis of a receipt-free auction protocol in the applied pi calculus. 
Naipeng Dong, Hugo Jonker,
and Jun Pang. 
In Proc. 7th Workshop on Formal Aspects in Security and Trust - FAST'10,
Lecture Notes in Computer Science 6561, 
pp. 223-238 2011
©Springer-Verlag, 2011. 
[ full version | 
proverif code ]
 
- 
Challenges in eHealth: from enabling to enforcing privacy. 
Naipeng Dong, Hugo Jonker,
and Jun Pang. 
In Proc. 1st Symposium on Foundations of Health Information Engineering and Systems - FHIES'11,
Lecture Notes in Computer Science 7151, pp. 195-206.
©Springer-Verlag, 2012. 
 
- 
A foul adversary: bribery, extortion and blackmail (Abstract). 
Naipeng Dong, 
and Tim Muller. 
In Joint Symposion on Security & Intelligent Information Systems - S&IIS'11, 2011. 
 
- 
Formal analysis of privacy in an eHealth protocol. 
Naipeng Dong, Hugo Jonker,
and Jun Pang. 
In Proc. 17th European Symposium on Research in Computer Security - ESORICS'12,
Lecture Notes in Computer Science 7459, pp. 325-342.
©Springer-Verlag, 2012. 
 
- 
Enforcing privacy in the presence of others: Notions, formalisations and relations. 
Naipeng Dong, Hugo Jonker,
and Jun Pang. 
In Proc. 18th European Symposium on Research in Computer Security - ESORICS'13,
Lecture Notes in Computer Science.
©Springer-Verlag, 2013. (To appear)
 
Technical Reports