{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:03Z","timestamp":1763467983061,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642154966"},{"type":"electronic","value":"9783642154973"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15497-3_4","type":"book-chapter","created":{"date-parts":[[2010,9,1]],"date-time":"2010-09-01T10:51:46Z","timestamp":1283338306000},"page":"55-70","source":"Crossref","is-referenced-by-count":21,"title":["Formal Analysis of Privacy for Vehicular Mix-Zones"],"prefix":"10.1007","author":[{"given":"Morten","family":"Dahl","sequence":"first","affiliation":[]},{"given":"St\u00e9phanie","family":"Delaune","sequence":"additional","affiliation":[]},{"given":"Graham","family":"Steel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"104","volume-title":"Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001)","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104\u2013115. ACM Press, New York (2001)"},{"key":"4_CR2","unstructured":"Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied pi calculus. In: Proc. 23rd IEEE Computer Security Foundations Symposium, CSF 2010 (to appear, 2010)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A.R. Beresford","year":"2003","unstructured":"Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing\u00a02(1), 46\u201355 (2003)","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming\u00a075(1), 3\u201351 (2008)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"4_CR5","unstructured":"Brus\u00f3, M., Chatzikokolakis, K., den Hartog, J.: Formal verification of privacy for RFID systems. In: Proc. 23rd IEEE Computer Security Foundations Symposium, CSF 2010 (to appear, 2010)"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-540-73275-4_10","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Butty\u00e1n","year":"2007","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 129\u2013141. Springer, Heidelberg (2007)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Holczer, T., Weimerskirch, A., Whyte, W.: SLOW: A practical pseudonym changing scheme for location privacy in VANETs. In: IEEE Vehicular Networking Conference (VNC), Tokyo, Japan, October 2009, pp. 1\u20138 (2009)","DOI":"10.1109\/VNC.2009.5416380"},{"issue":"4","key":"4_CR8","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security\u00a017(4), 435\u2013487 (2009)","journal-title":"Journal of Computer Security"},{"key":"4_CR9","series-title":"IFIP Conference Proceedings","first-page":"263","volume-title":"Proc. 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008)","author":"S. Delaune","year":"2008","unstructured":"Delaune, S., Ryan, M.D., Smyth, B.: Automatic verification of privacy properties in the applied pi-calculus. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C.D. (eds.) Proc. 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008), Trondheim, Norway, June 2008. IFIP Conference Proceedings, vol.\u00a0263, pp. 263\u2013278. Springer, Heidelberg (2008)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11767831_13","volume-title":"Privacy Enhancing Technologies","author":"F. Doetzer","year":"2006","unstructured":"Doetzer, F.: Privacy issues in vehicular ad hoc networks. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, pp. 197\u2013209. Springer, Heidelberg (2006)"},{"key":"4_CR11","unstructured":"Freudiger, J., Raya, M., F\u00e9legyh\u00e1zi, M., Papadimitratos, P., Hubaux, J.-P.: Mix-zones for location privacy in vehicular networks. In: Proc. of ACM Workshop on Wireless Networking for Intelligent Transportation Systems, WiN-ITS 2007 (2007)"},{"key":"4_CR12","unstructured":"Parno, B., Perrig, A.: Challenges in securing vehicular networks. In: Proc. 4th Workshop on Hot Topics in Networks (November 2005)"},{"key":"4_CR13","unstructured":"Sleet, D., Peden, M., Scurfield, R.: World report on traffic injury prevention. World Health Organization Report (2004)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Raya, M., Hubaux, J.-P.: The Security of Vehicular Ad Hoc Networks. In: Proc. 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 11\u201321 (2005)","DOI":"10.1145\/1102219.1102223"},{"key":"4_CR15","unstructured":"Safespot project (2006-2010), \n                    \n                      http:\/\/www.safespot-eu.org\/"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1007\/3-540-61770-1_38","volume-title":"Computer Security - ESORICS 96","author":"S. Schneider","year":"1996","unstructured":"Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 198\u2013218. Springer, Heidelberg (1996)"},{"key":"4_CR17","unstructured":"IEEE standard. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments \u2013 Security Services for Applications and Management Messages (approved June 8, 2006)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79966-5_1","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"T. Deursen van","year":"2008","unstructured":"van Deursen, T., Mauw, S., Radomirovic, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019, pp. 1\u201315. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15497-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:29:16Z","timestamp":1559507356000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15497-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642154966","9783642154973"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15497-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}