Mobile values, new names, and secure communication, Proc. of POPL, pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Untraceability in the applied pi-calculus, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), pp.1-6, 2009. ,
DOI : 10.1109/ICITST.2009.5402514
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus, 2010 23rd IEEE Computer Security Foundations Symposium, pp.107-121, 2010. ,
DOI : 10.1109/CSF.2010.15
Adversary model for radio frequency identification, 2005. ,
Cryptography in Radio Frequency Identification and Fair Exchange Protocols, 2005. ,
Provable Unlinkability against Traffic Analysis, Proc. of Financial Cryptography, pp.266-280, 2004. ,
DOI : 10.1007/978-3-540-27809-2_26
Formal Verification of Privacy for RFID Systems, 2010 23rd IEEE Computer Security Foundations Symposium, pp.75-88, 2010. ,
DOI : 10.1109/CSF.2010.13
Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols, 2006 Securecomm and Workshops, pp.1-9, 2006. ,
DOI : 10.1109/SECCOMW.2006.359563
Epistemic Logic for the Applied Pi Calculus, Proceedings of IFIP. LNCS, pp.182-197, 2009. ,
DOI : 10.1016/j.entcs.2006.08.026
Secure anonymous RFID authentication protocols, 2006. ,
Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap, Proc. of LPAR, pp.226-241, 2007. ,
DOI : 10.1007/978-3-540-75560-9_18
Untraceability of RFID Protocols, Proc. of WISTP, pp.1-15, 2008. ,
DOI : 10.1007/11495628_4
Algebraic Attacks on RFID Protocols, Proc. of WISTP, pp.38-51, 2009. ,
DOI : 10.1007/978-3-642-03944-7_4
Attacking Unlinkability: The Importance of Context, Proc. of Privacy Enhancing Technologies, pp.1-16, 2007. ,
DOI : 10.1007/978-3-540-75551-7_1
Anonymity and information hiding in multiagent systems, Proc. of CSFW, pp.75-88, 2003. ,
Information hiding, anonymity and privacy: a modular approach, Journal of Computer Security, vol.12, issue.1, pp.3-36, 2004. ,
DOI : 10.3233/JCS-2004-12102
Defining strong privacy for rfid, Proc. of PerCom Workshops, pp.342-347, 2007. ,
Epistemic Logic for AI and Computer Science, 2004. ,
DOI : 10.1017/CBO9780511569852
A calculus of mobile processes, I, Information and Computation, vol.100, issue.1, pp.1-77, 1989. ,
DOI : 10.1016/0890-5401(92)90008-4
Privacy through Noise: A Design Space for Private Identification, 2009 Annual Computer Security Applications Conference, 2009. ,
DOI : 10.1109/ACSAC.2009.55
Cryptographic approach to " privacy-friendly " tags, Proc. of RFID Privacy Workshop, 2003. ,
Privacy of Recent RFID Authentication Protocols, Proc. of ISPEC, pp.263-277, 2008. ,
DOI : 10.1007/978-3-540-79104-1_19
Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2000. ,
DOI : 10.1007/3-540-44702-4_1
Modelling Unlinkability, Proc. of Privacy Enhancing Technologies, pp.32-47, 2003. ,
DOI : 10.1007/978-3-540-40956-4_3
Group Principals and the Formalization of Anonymity, Proc. of World Congress on Formal Methods, pp.814-833, 1999. ,
DOI : 10.1007/3-540-48119-2_45
On Privacy Models for RFID, Proc. of ASIACRYPT, pp.68-87, 2007. ,
DOI : 10.1007/978-3-540-76900-2_5
Security and privacy aspects of low-cost RFID systems, Proc. of SPC, pp.201-212, 2003. ,