People

Papers & Software

Seminar

Stages



INRIA

LIX

CNRS
Papers

Papers (co-)authored by Jun Pang

[1] Yuxin Deng, Catuscia Palamidessi, and Jun Pang. Weak probabilistic anonymity. In Michael Backes and Andre Scedrov, editors, Proceedings of the 3rd International Workshop on Security Issues in Concurrency (SecCo), volume 180 (1) of Electronic Notes in Theoretical Computer Science, pages 55-76. Elsevier Science B.V., 2007. http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report_wa.pdf.
[ bib ]
[2] Yuxin Deng, Tom Chothia, Catuscia Palamidessi, and Jun Pang. Metrics for action-labelled quantitative transition systems. In Proceedings of the Third Workshop on Quantitative Aspects of Programming Languages (QAPL 2005), volume 153 of Electronic Notes in Theoretical Computer Science, pages 79-96. Elsevier Science Publishers, 2006. http://www.lix.polytechnique.fr/~catuscia/papers/Metrics/QAPL/gts.pdf.
[ bib ]
[3] Yuxin Deng, Jun Pang, and Peng Wu, 2006. Personal Communication.
[ bib ]
[4] Yuxin Deng, Jun Pang, and Peng Wu. Measuring anonymity with relative entropy. In T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors, Proc. of the of the 4th Int. Worshop on Formal Aspects in Security and Trust, volume 4691 of LNCS, pages 65-79. Springer, 2006.
[ bib ]
[5] Yuxin Deng, Catuscia Palamidessi, and Jun Pang. Compositional reasoning for probabilistic finite-state behaviors. In Aart Middeldorp, Vincent van Oostrom, Femke van Raamsdonk, and Roel C. de Vrijer, editors, Processes, Terms and Cycles: Steps on the Road to Infinity, volume 3838 of Lecture Notes in Computer Science, pages 309-337. Springer, 2005. http://www.lix.polytechnique.fr/~catuscia/papers/Yuxin/BookJW/par.pdf.
[ bib ]

This file has been generated by bibtex2html 1.74


Back


Page maintainer: Catuscia Palamidessi