A Cryptographic Framework for the Controlled Release of Certified Data, Proceedings of SPW '04, 2004. ,
DOI : 10.1007/3-540-45682-1_31
Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008. ,
DOI : 10.1109/LICS.2005.8
Verifying Privacy by Little Interaction and No Process Equivalence, Proceedings of SECRYPT '12 ,
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures, Proceedings of SEC '06, 2006. ,
DOI : 10.1007/0-387-33406-8_3
Using State Space Exploration and a Natural Deduction Style MessageDerivation Engine to Verify Security Protocols, Proceedings of PROCOMET '98, 1998. ,
DOI : 10.1007/978-0-387-35358-6_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.4858
Formal Analysis of Privacy for Anonymous Location Based Services, Proceedings of TOSCA'11, 2011. ,
DOI : 10.1007/978-3-642-27375-9_6
Formal Analysis of Privacy in an eHealth Protocol, Proceedings of ESORICS '12, 2012. ,
DOI : 10.1007/978-3-642-33167-1_19
A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2011. ,
DOI : 10.1109/ICC.2012.6364938
URL : https://hal.archives-ouvertes.fr/hal-01338064
Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004. ,
DOI : 10.1016/S1363-4127(04)00014-7
Comparing Identity Management Frameworks in a Business Context, Proceedings of IFIP/FIDIS summer school '08, 2008. ,
DOI : 10.1109/MSP.2008.50
Formal methods for cryptographic protocol analysis: emerging issues and trends, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.44-54, 2003. ,
DOI : 10.1109/JSAC.2002.806125
The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998. ,
DOI : 10.3233/JCS-1998-61-205
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009. ,
DOI : 10.1109/ICITST.2009.5402501
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy, Proceedings of STM '12, 2012. ,
DOI : 10.1007/978-3-642-38004-4_10
A Formal Privacy Analysis of Identity Management Systems, ArXiv.org, 2012. ,
Formal Privacy Analysis of Communication Protocols for Identity Management, Proceedings of ICISS '11, pp.235-249, 2011. ,
DOI : 10.1080/01621459.1969.10501049
Symbolic Analysis of Identity Mixer, 2013. ,