E. Bangerter, J. Camenisch, and A. Lysyanskaya, A Cryptographic Framework for the Controlled Release of Certified Data, Proceedings of SPW '04, 2004.
DOI : 10.1007/3-540-45682-1_31

B. Blanchet, M. Abadi, and C. Fournet, Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.3-51, 2008.
DOI : 10.1109/LICS.2005.8

D. Butin and G. Bella, Verifying Privacy by Little Interaction and No Process Equivalence, Proceedings of SECRYPT '12

J. Camenisch, D. Sommer, and R. Zimmermann, A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures, Proceedings of SEC '06, 2006.
DOI : 10.1007/0-387-33406-8_3

E. M. Clarke, S. Jha, and W. R. Marrero, Using State Space Exploration and a Natural Deduction Style MessageDerivation Engine to Verify Security Protocols, Proceedings of PROCOMET '98, 1998.
DOI : 10.1007/978-0-387-35358-6_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.4858

M. Dahl, S. Delaune, and G. Steel, Formal Analysis of Privacy for Anonymous Location Based Services, Proceedings of TOSCA'11, 2011.
DOI : 10.1007/978-3-642-27375-9_6

N. Dong, H. Jonker, and J. Pang, Formal Analysis of Privacy in an eHealth Protocol, Proceedings of ESORICS '12, 2012.
DOI : 10.1007/978-3-642-33167-1_19

J. Dreier, P. Lafourcade, and Y. Lakhnech, A formal taxonomy of privacy in voting protocols, 2012 IEEE International Conference on Communications (ICC), 2011.
DOI : 10.1109/ICC.2012.6364938

URL : https://hal.archives-ouvertes.fr/hal-01338064

M. Hansen, P. Berlich, J. Camenisch, S. Clauß, A. Pfitzmann et al., Privacy-enhancing identity management, Information Security Technical Report, vol.9, issue.1, pp.35-44, 2004.
DOI : 10.1016/S1363-4127(04)00014-7

J. H. Hoepman, R. Joosten, and J. Siljee, Comparing Identity Management Frameworks in a Business Context, Proceedings of IFIP/FIDIS summer school '08, 2008.
DOI : 10.1109/MSP.2008.50

C. Meadows, Formal methods for cryptographic protocol analysis: emerging issues and trends, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.44-54, 2003.
DOI : 10.1109/JSAC.2002.806125

L. C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security, vol.6, issue.1-2, pp.85-128, 1998.
DOI : 10.3233/JCS-1998-61-205

R. Tinabo, F. Mtenzi, and B. O-'shea, Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009.
DOI : 10.1109/ICITST.2009.5402501

M. Veeningen, B. De-weger, and N. Zannone, Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy, Proceedings of STM '12, 2012.
DOI : 10.1007/978-3-642-38004-4_10

M. Veeningen, B. De-weger, and N. Zannone, A Formal Privacy Analysis of Identity Management Systems, ArXiv.org, 2012.

M. Veeningen, N. Zannone, and B. De-weger, Formal Privacy Analysis of Communication Protocols for Identity Management, Proceedings of ICISS '11, pp.235-249, 2011.
DOI : 10.1080/01621459.1969.10501049

M. Veeningen, Symbolic Analysis of Identity Mixer, 2013.