{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:12:32Z","timestamp":1742911952762,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642402029"},{"type":"electronic","value":"9783642402036"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40203-6_28","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T02:48:53Z","timestamp":1376448533000},"page":"499-516","source":"Crossref","is-referenced-by-count":4,"title":["Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations"],"prefix":"10.1007","author":[{"given":"Naipeng","family":"Dong","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"28_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"28_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79966-5_1","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"T. Deursen van","year":"2008","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Arapinis, M., Chothia, T., Ritter, E., Ryan, M.D.: Analysing unlinkability and anonymity using the applied pi calculus. In: Proc. 23rd CSF, pp. 107\u2013121. IEEE (2010)","DOI":"10.1109\/CSF.2010.15"},{"issue":"1","key":"28_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1952982.1952986","volume":"14","author":"J. Bohli","year":"2011","unstructured":"Bohli, J., Pashalidis, A.: Relations among privacy notions. ACM Transactions on Information and System Security 14(1), 4:1\u20134:24 (2011)","journal-title":"ACM Transactions on Information and System Security"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Jonker, H.L., Pang, J.: Bulletin boards in voting systems: Modelling and measuring privacy. In: Proc. 6th ARES, pp. 294\u2013300. IEEE (2011)","DOI":"10.1109\/ARES.2011.50"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proc. 26th STOC, pp. 544\u2013553. ACM (1994)","DOI":"10.1145\/195058.195407"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/3-540-45811-5_14","volume-title":"Information Security","author":"M. Abe","year":"2002","unstructured":"Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 191\u2013199. Springer, Heidelberg (2002)"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proc. 4th WPES, pp. 61\u201370. ACM (2005)","DOI":"10.1145\/1102199.1102213"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/978-3-540-69485-4_9","volume-title":"Public Key Infrastructure","author":"B. Decker De","year":"2008","unstructured":"De Decker, B., Layouni, M., Vangheluwe, H., Verslype, K.: A privacy-preserving eHealth protocol compliant with the Belgian healthcare system. In: Mj\u00f8lsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol.\u00a05057, pp. 118\u2013133. Springer, Heidelberg (2008)"},{"issue":"4","key":"28_CR10","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S. Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security\u00a017(4), 435\u2013487 (2009)","journal-title":"Journal of Computer Security"},{"key":"28_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-19751-2_15","volume-title":"Formal Aspects of Security and Trust","author":"N. Dong","year":"2011","unstructured":"Dong, N., Jonker, H., Pang, J.: Analysis of a receipt-free auction protocol in the applied pi calculus. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol.\u00a06561, pp. 223\u2013238. Springer, Heidelberg (2011)"},{"key":"28_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-33167-1_19","volume-title":"Computer Security \u2013 ESORICS 2012","author":"N. Dong","year":"2012","unstructured":"Dong, N., Jonker, H., Pang, J.: Formal analysis of privacy in an eHealth protocol. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 325\u2013342. Springer, Heidelberg (2012)"},{"key":"28_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-32355-3_12","volume-title":"Foundations of Health Informatics Engineering and Systems","author":"N. Dong","year":"2012","unstructured":"Dong, N., Jonker, H., Pang, J.: Challenges in eHealth: From enabling to enforcing privacy. In: Liu, Z., Wassyng, A. (eds.) FHIES 2011. LNCS, vol.\u00a07151, pp. 195\u2013206. Springer, Heidelberg (2012)"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-27901-0_13","volume-title":"Foundations and Practice of Security","author":"J. Dreier","year":"2012","unstructured":"Dreier, J., Lafourcade, P., Lakhnech, Y.: Vote-independence: A powerful privacy notion for voting protocols. In: Garcia-Alfaro, J., Lafourcade, P. (eds.) FPS 2011. LNCS, vol.\u00a06888, pp. 164\u2013180. Springer, Heidelberg (2012)"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"28_CR16","unstructured":"Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multi-party contract signing. In: Proc. 17th CSFW, pp. 266\u2013279. IEEE (2004)"},{"key":"28_CR17","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. 14th CSFW, pp. 82\u201396. IEEE (2001)"},{"issue":"1","key":"28_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B. Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming\u00a075(1), 3\u201351 (2008)","journal-title":"Journal of Logic and Algebraic Programming"},{"key":"28_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-36830-1_12","volume-title":"Principles of Security and Trust","author":"V. Cheval","year":"2013","unstructured":"Cheval, V., Blanchet, B.: Proving more observational equivalences with ProVerif. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol.\u00a07796, pp. 226\u2013246. Springer, Heidelberg (2013)"},{"key":"28_CR20","unstructured":"Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: Proc. 25th S&P, pp. 86\u2013100. IEEE (2004)"},{"issue":"2","key":"28_CR21","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"28_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-540-31987-0_14","volume-title":"Programming Languages and Systems","author":"S. Kremer","year":"2005","unstructured":"Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol.\u00a03444, pp. 186\u2013200. Springer, Heidelberg (2005)"},{"key":"28_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-27375-9_6","volume-title":"Theory of Security and Applications","author":"M. Dahl","year":"2012","unstructured":"Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for anonymous location based services. In: M\u00f6dersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol.\u00a06993, pp. 98\u2013112. Springer, Heidelberg (2012)"},{"key":"28_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-642-33167-1_26","volume-title":"Computer Security \u2013 ESORICS 2012","author":"J. Dreier","year":"2012","unstructured":"Dreier, J., Lafourcade, P., Lakhnech, Y.: Defining privacy for weighted votes, single and multi-voter coercion. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 451\u2013468. Springer, Heidelberg (2012)"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th POPL, pp. 104\u2013115. ACM (2001)","DOI":"10.1145\/373243.360213"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: Proc. 30th S&P, pp. 251\u2013266. IEEE (2009)","DOI":"10.1109\/SP.2009.13"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Dong, N., Jonker, H.L., Pang, J.: Enforcing privacy in the presence of others: Notions, formalisations and relations. Technical report, University of Luxembourg (2013), \n                    \n                      http:\/\/satoss.uni.lu\/projects\/epriv\/","DOI":"10.1007\/978-3-642-40203-6_28"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2013"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40203-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:43:53Z","timestamp":1559508233000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40203-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642402029","9783642402036"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40203-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}