{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T08:17:48Z","timestamp":1672474668256},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T00:00:00Z","timestamp":1211932800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2008,11]]},"DOI":"10.1007\/s10207-008-0057-y","type":"journal-article","created":{"date-parts":[[2008,5,27]],"date-time":"2008-05-27T09:41:22Z","timestamp":1211881282000},"page":"395-420","source":"Crossref","is-referenced-by-count":3,"title":["Specifying and implementing privacy-preserving cryptographic protocols"],"prefix":"10.1007","volume":"7","author":[{"given":"Theodoros","family":"Balopoulos","sequence":"first","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Sokratis K.","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,28]]},"reference":[{"key":"57_CR1","unstructured":"Acquisti, A.: Receipt-free homomorphic elections and write-in ballots. Technical Report 2004\/105, International Association for Cryptologic Research, May 2004"},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Aspinall, D., Compagnoni, A.: Subtyping dependent types. In: Clarke, E. (ed.) Proceedings of the 11th Annual Symposium on Logic in Computer Science, pp. 86\u201397. IEEE Computer Society Press, New York (1996)","DOI":"10.1109\/LICS.1996.561307"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Balopoulos, T., Gritzalis, S., Katsikas, S.K.: An extension of Typed MSR for specifying esoteric protocols and their Dolev\u2013Yao intruder. In: Chadwick, D., Preneel, B. (ed.) Proceedings of the CMS\u20192004 IFIP TC6\/TC11 8th International Conference on Communications and Multimedia Security, vol. 175, pp. 209\u2013221. Springer, Heidelberg (2004)","DOI":"10.1007\/11382324_16"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Balopoulos, T., Gritzalis, S., Katsikas, S.K.: Specifying electronic voting protocols in Typed MSR. In: De Capitani di Vimercati, S., Dingledine, R. (eds.) Proceedings of the 2005 ACM Computer and Communications Security Conference \u2013Workshop on Privacy in the Electronic Society, pp. 35\u201339. ACM Press, New York (2005)","DOI":"10.1145\/1102199.1102207"},{"issue":"5","key":"57_CR5","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/j.csi.2005.01.008","volume":"27","author":"T. Balopoulos","year":"2005","unstructured":"Balopoulos T., Gritzalis S., Katsikas S.K.: Specifying privacy-preserving protocols in Typed MSR. Comput. Stand. Interf. 27(5), 501\u2013512 (2005)","journal-title":"Comput. Stand. Interf."},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Boudot, F.: Efficient proofs that a committed number lies in an interval. In EUROCRYPT, pp. 431\u2013444 (2000)","DOI":"10.1007\/3-540-45539-6_31"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"Brandeis, L., Warren, S.: The right to privacy. In: Harvard Law Review, vol. 4 (1890)","DOI":"10.2307\/1321160"},{"issue":"1","key":"57_CR8","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows M., Abadi M., Needham R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"57_CR9","unstructured":"Cervesato, I.: Typed multiset rewriting specifications of security protocols. In: Seda, A. (ed.) First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology\u2014MFCSIT\u201900, pp. 1\u201343, Cork, Ireland, 19\u201321 July 2000. ENTCS vol. 40 Elsevier, Amsterdorm"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"Cervesato, I.: Typed MSR: syntax and examples. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) First International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security\u2014MMM\u201901, pp. 159\u2013177, St. Petersburg, Russia, 21\u201323 May 2001, LNCS 2052, Springer, Heidelberg","DOI":"10.1007\/3-540-45116-1_18"},{"key":"57_CR11","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM, 4(2), (1981)"},{"issue":"10","key":"57_CR12","first-page":"1030","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum D.: Security without identification: transaction systems to make big brother obsolete. Comm. Assoc. Comput. Mach. 28(10), 1030\u20131044 (1985)","journal-title":"Comm. Assoc. Comput. Mach."},{"key":"57_CR13","doi-asserted-by":"crossref","unstructured":"Diaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. (eds.) Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), volume LNCS 2482. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-36467-6_5"},{"issue":"29","key":"57_CR14","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"2","author":"D. Dolev","year":"1983","unstructured":"Dolev D., Yao A.C.: On the security of public key protocols. IEEE Trans. Inf. Theor. 2(29), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Fabrega, F.J, Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: Proceedings of the IEEE Symposium on Security and Privacy, May 1998","DOI":"10.21236\/ADA459060"},{"key":"57_CR16","doi-asserted-by":"crossref","unstructured":"Feige, U., Fiat, A., Shamir, A.: Zero knowledge proofs of identity. In: Proceedings of the 19th ACM Symposium on Theory of Computing, pp. 210\u2013217, May 1987","DOI":"10.1145\/28395.28419"},{"key":"57_CR17","doi-asserted-by":"crossref","unstructured":"Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) Proceedings of the 1st International Workshop on Information Hiding, vol. 1174 of Lecture Notes in Computer Science, pp. 137\u2013150. Springer, Heidelberg (1996)","DOI":"10.1007\/3-540-61996-8_37"},{"key":"57_CR18","doi-asserted-by":"crossref","unstructured":"Gritzalis, S., Spinellis, D., Georgiadis, P.: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. In: Computer Communications, vol. 22, pp. 697\u2013709. Elsevier, Amsterdom (1999)","DOI":"10.1016\/S0140-3664(99)00030-4"},{"issue":"8","key":"57_CR19","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"C.A.R. Hoare","year":"1978","unstructured":"Hoare C.A.R.: Communicating sequential processes. j-CACM 21(8), 666\u2013677 (1978)","journal-title":"j-CACM"},{"key":"57_CR20","unstructured":"Holt, J.E., Seamons, K.E.: Selective disclosure credential sets. http:\/\/citeseer.nj.nec.com\/541329.html , (2002)"},{"key":"57_CR21","doi-asserted-by":"crossref","unstructured":"Marrero, W., Clarke, E.M., Jha, S.: Model checking for security protocols. In: Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, (1997)","DOI":"10.21236\/ADA327281"},{"key":"57_CR22","doi-asserted-by":"crossref","unstructured":"Milner, R.: A calculus of communicating systems. In: Lecture Notes in Computer Science, vol. 92, (1980)","DOI":"10.1007\/3-540-10235-3"},{"key":"57_CR23","volume-title":"Communicating and mobile systems: the \u03c0-calculus","author":"R. Milner","year":"1999","unstructured":"Milner R.: Communicating and mobile systems: the \u03c0-calculus. Cambridge University Press, Cambridge (1999)"},{"key":"57_CR24","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: Practical mostly-static information flow control. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL), pp. 228\u2013241, January 1999","DOI":"10.1145\/292540.292561"},{"key":"57_CR25","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A decentralized model for information flow control. In: Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP), pp. 129\u2013142, October 1997","DOI":"10.1145\/268998.266669"},{"key":"57_CR26","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: Complete, safe information flow with decentralized labels. In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 186\u2013197, May 1998","DOI":"10.1109\/SECPRI.1998.674834"},{"key":"57_CR27","unstructured":"Paillier, P.: Public-key cryptosystems based on discrete logarithms residues. In: Advances in Cryptology - Eurocrypt \u201999, pp. 223\u2013238. Springer, LNCS 1592, (1999)"},{"key":"57_CR28","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management\u2014a consolidated proposal for terminology. Draft, version 0.29. http:\/\/dud.inf.tu-dresden.de\/Anon_Terminology.shtml , July 2007"},{"key":"57_CR29","doi-asserted-by":"crossref","unstructured":"Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: ESORICS, pp. 198\u2013218, (1996)","DOI":"10.1007\/3-540-61770-1_38"},{"key":"57_CR30","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. (eds.) Proceedings of Privacy Enhancing Technologies Workshop (PET 2002), vol. LNCS 2482. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-36467-6_4"},{"key":"57_CR31","doi-asserted-by":"crossref","unstructured":"Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: active attacks on several mix types. In: Petitcolas F. (ed.) Proceedings of Information Hiding Workshop (IH 2002), vol. LNCS 2578. Springer, Heidelberg, October 2002","DOI":"10.1007\/3-540-36415-3_3"},{"key":"57_CR32","doi-asserted-by":"crossref","unstructured":"Syverson, P., Cervesato, I.: The logic of authentication protocols. In Foundations of Security Analysis and Design, vol. 2171 of Tutorial Lectures. Springer, Heidelbeg (2001)","DOI":"10.1007\/3-540-45608-2_2"},{"key":"57_CR33","doi-asserted-by":"crossref","unstructured":"Syverson, P., Meadows, C., Cervesato, I.: Dolev-Yao is no better than Machiavelli. In: Degano, P. (ed.) First Workshop on Issues in the Theory of Security\u2014WITS\u201900, pp. 87\u201392, July 2000","DOI":"10.21236\/ADA464936"},{"key":"57_CR34","unstructured":"United Nations. Universal Declaration of Human Rights, 1948"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0057-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0057-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0057-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:23Z","timestamp":1559113283000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0057-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,28]]},"references-count":34,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,11]]}},"alternative-id":["57"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0057-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,5,28]]}}}