Characterising testing preorders for finite probabilistic processes Y Deng, R Van Glabbeek, M Hennessy, C Morgan, C Zhang 22nd Annual IEEE Symposium on Logic in Computer Science (LICS 2007), 313-325, 2007 | 115 | 2007 |
User-input dependence analysis via graph reachability B Scholz, C Zhang, C Cifuentes 2008 Eighth IEEE International Working Conference on Source Code Analysis …, 2008 | 59 | 2008 |
Algorithmic verification of noninterference properties R van der Meyden, C Zhang Electronic Notes in Theoretical Computer Science 168, 61-75, 2007 | 57 | 2007 |
Accessible family involvement in early childhood programs JW Morrison, P Storey, C Zhang Dimensions of Early Childhood 39 (3), 21-26, 2011 | 51 | 2011 |
Remarks on testing probabilistic processes Y Deng, R Van Glabbeek, M Hennessy, C Morgan, C Zhang Electronic Notes in Theoretical Computer Science 172, 359-397, 2007 | 47 | 2007 |
A comparison of semantic models for noninterference R van der Meyden, C Zhang Theoretical Computer Science 411 (47), 4123-4147, 2010 | 36* | 2010 |
Scalar outcomes suffice for finitary probabilistic testing Y Deng, R Van Glabbeek, C Morgan, C Zhang European Symposium on Programming, 363-378, 2007 | 36 | 2007 |
Probabilistic alternating-time temporal logic of incomplete information and synchronous perfect recall X Huang, K Su, C Zhang Proceedings of the AAAI Conference on Artificial Intelligence 26 (1), 2012 | 27 | 2012 |
Intransitive noninterference in nondeterministic systems K Engelhardt, R Van Der Meyden, C Zhang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 15 | 2012 |
Information flow in systems with schedulers R van der Meyden, C Zhang 2008 21st IEEE Computer Security Foundations Symposium, 301-312, 2008 | 15 | 2008 |
Game-Based Verification of Multi-Party Contract Signing Protocols Y Zhang, C Zhang, J Pang, S Mauw Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009 …, 2010 | 12* | 2010 |
Path-sensitive data flow analysis simplified K Winter, C Zhang, IJ Hayes, N Keynes, C Cifuentes, L Li International Conference on Formal Engineering Methods, 415-430, 2013 | 11 | 2013 |
A trust-augmented voting scheme for collaborative privacy management Y Sun, C Zhang, J Pang, B Alcalde, S Mauw Journal of Computer Security 20 (4), 437-459, 2012 | 11 | 2012 |
Imparting cultural values to Chinese children through literature C Zhang, JW Morrison International Journal of Early Childhood 42 (1), 7-26, 2010 | 11 | 2010 |
Method and system for fast static taint analysis BF Scholz, C Zhang, CN Cifuentes US Patent 8,327,339, 2012 | 10 | 2012 |
On probabilistic alternating simulations C Zhang, J Pang IFIP International Conference on Theoretical Computer Science, 71-85, 2010 | 9 | 2010 |
Conditional information flow policies and unwinding relations C Zhang International Symposium on Trustworthy Global Computing, 227-241, 2011 | 8 | 2011 |
Extending a key-chain based certified email protocol with transparent TTP Z Liu, J Pang, C Zhang 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010 | 8 | 2010 |
A trust-augmented voting scheme for collaborative privacy management Y Sun, C Zhang, J Pang, B Alcade, S Mauw International Workshop on Security and Trust Management, 132-146, 2010 | 7 | 2010 |
User-input dependence analysis via graph reachability, Sun Microsystems B Scholz, C Zhang, C Cifuentes Inc., Mountain View, CA, 2008 | 7 | 2008 |