Naipeng Dong

Learn More
We formally study two privacy-type properties in online auction protocols, bidding-price-secrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied π calculus. We analyse the receipt-free auction protocol by Abe and Suzuki. Bidding-price-secrecy of the protocol is verified using ProVerif, whereas(More)
Protecting privacy against bribery/coercion is a necessary requirement in electronic services, like e-voting, e-auction and e-health. Domain-specific privacy properties have been proposed to capture this. We generalise these properties as enforced privacy : a system enforces a user’s privacy even when the user collaborates with the adversary. In addition,(More)
Given the sensitive nature of health data, security and privacy of eHealth systems is of prime importance. Properties like secrecy, authentication, anonymity, and untraceability need to be satisfied. However, only satisfying these properties is not sufficient in case users can reveal private information to the adversary. For instance, a pharmaceutical(More)
We formally study two privacy-type properties for e-auction protocols: bidding-pricesecrecy and receipt-freeness. These properties are formalised as observational equivalences in the applied pi calculus. We analyse two receipt-free auction protocols: one proposed by Abe and Suzuki in 2002 (AS02) and the other by Howlader et al. in 2014 (HRM14).(More)
The heavy use of event-callback mechanism in frameworks like Android causes challenges for static analysis. Modelling of callback mechanisms for Android applications (app for short) is becoming a major method to address such challenges. In this work, we aim to construct a generic callback-related model that supports path-sensitive analysis. We consider(More)
A BAR system specifies a cooperation between agents who can be altruistic when they follow the specified behaviours, Byzantine when they randomly deviate from specifications and rational when they deviate to increase their own benefits. We consider whether a rational agent indeed follows the specification of a probabilistic BAR system as verifying whether(More)
Privacy protection is an important requirement in both everyday life and the Inter-net. As the Internet is an open network, adversaries can observe and manipulate data flowing over it. To ensure privacy in communications over open networks, cryptographic protocols have been widely used, and thus, proposing such protocols has become a popular research area.(More)