{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:14:23Z","timestamp":1763468063203,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642273742"},{"type":"electronic","value":"9783642273759"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27375-9_6","type":"book-chapter","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T06:54:43Z","timestamp":1326178483000},"page":"98-112","source":"Crossref","is-referenced-by-count":9,"title":["Formal Analysis of Privacy for Anonymous Location Based Services"],"prefix":"10.1007","author":[{"given":"Morten","family":"Dahl","sequence":"first","affiliation":[]},{"given":"St\u00e9phanie","family":"Delaune","sequence":"additional","affiliation":[]},{"given":"Graham","family":"Steel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"104","volume-title":"Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001)","author":"M. Abadi","year":"2001","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104\u2013115. ACM Press, New York (2001)"},{"key":"6_CR2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/266420.266432","volume-title":"Proc. 4th ACM Conference on Computer and Communications Security","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conference on Computer and Communications Security, Zurich, Switzerland, pp. 36\u201347. ACM Press, New York (1997)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/CSF.2010.15","volume-title":"Proc. 23rd IEEE Computer Security Foundations Symposium (CSF 2010)","author":"M. Arapinis","year":"2010","unstructured":"Arapinis, M., Chothia, T., Ritter, E., Ryan, M.: Analysing unlinkability and anonymity using the applied pi calculus. In: Proc. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), pp. 107\u2013121. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"6_CR4","first-page":"202","volume-title":"Proc. Symposium on Security and Privacy (S&P 2008)","author":"M. Backes","year":"2008","unstructured":"Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proc. Symposium on Security and Privacy (S&P 2008), pp. 202\u2013215. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"6_CR5","unstructured":"Blanchet, B.: Cryptographic Protocol Verifier User Manual (2004), http:\/\/www.di.ens.fr\/~blanchet\/crypto\/proverif-manual.ps.gz"},{"issue":"1","key":"6_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming\u00a075(1), 3\u201351 (2008)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"6_CR7","unstructured":"Blumberg, A.J., Balakrishnan, H., Popa, R.: VPriv: Protecting privacy in location-based vehicular services. In: Proc. 18th Usenix Security Symposium (2009)"},{"key":"6_CR8","volume-title":"Proc. 23rd IEEE Computer Security Foundations Symposium (CSF 2010)","author":"M. Bruso","year":"2010","unstructured":"Bruso, M., Chatzikokolakis, K., den Hartog, J.: Formal verification of privacy for RFID systems. In: Proc. 23rd IEEE Computer Security Foundations Symposium (CSF 2010). IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/CSF.2009.9","volume-title":"Proc. 22nd IEEE Computer Security Foundations Symposium (CSF 2009)","author":"V. Cortier","year":"2009","unstructured":"Cortier, V., Delaune, S.: A\u00a0method for proving observational equivalence. In: Proc. 22nd IEEE Computer Security Foundations Symposium (CSF 2009), Port Jefferson, NY, USA, pp. 266\u2013276. IEEE Computer Society Press, Los Alamitos (2009)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-15497-3_4","volume-title":"Computer Security \u2013 ESORICS 2010","author":"M. Dahl","year":"2010","unstructured":"Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for vehicular mix-zones. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 55\u201370. Springer, Heidelberg (2010)"},{"key":"6_CR11","series-title":"IFIP Conference Proceedings","first-page":"263","volume-title":"Proc. 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008)","author":"S. Delaune","year":"2008","unstructured":"Delaune, S., Ryan, M.D., Smyth, B.: Automatic verification of privacy properties in the applied pi-calculus. In: Proc. 2nd Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008). IFIP Conference Proceedings, vol.\u00a0263, pp. 263\u2013278. Springer, Heidelberg (2008)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dikaiakos, M.D., Iqbal, S., Nadeem, T., Iftode, L.: VITP: an information transfer protocol for vehicular computing. In: Proc. 2nd International Workshop on Vehicular Ad Hoc Networks (VANET 2005), pp. 30\u201339 (2005)","DOI":"10.1145\/1080754.1080759"},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"The Foundations of Cryptography","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: The Foundations of Cryptography, vol.\u00a01. Cambridge University Press, Cambridge (2001)"},{"key":"6_CR14","unstructured":"IEEE. IEEE standard. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments \u2013 Security Services for Applications and Management Messages, approved (June 8, 2006)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.D.: Analysis of an Electronic Voting Protocol in the Applied Pi Calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"key":"6_CR16","unstructured":"Lawson, N.: Highway to hell: Hacking toll systems. Presentation at Blackhat (2008), slides http:\/\/rdist.root.org\/2008\/08\/07\/fastrak-talk-summary-and-slides\/"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-10235-3","volume-title":"A Calculus of Communication Systems","author":"R. Milner","year":"1980","unstructured":"Milner, R.: A Calculus of Communication Systems. LNCS, vol.\u00a092. Springer, Heidelberg (1980)"}],"container-title":["Lecture Notes in Computer Science","Theory of Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27375-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T11:36:59Z","timestamp":1686656219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27375-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642273742","9783642273759"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27375-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}