{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:00:24Z","timestamp":1765486824017,"version":"3.37.3"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"funder":[{"DOI":"10.13039\/501100004836","name":"Danish Council for Independent Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004836","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1109\/csf54842.2022.9919668","type":"proceedings-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:29:20Z","timestamp":1667525360000},"page":"130-146","source":"Crossref","is-referenced-by-count":3,"title":["Privacy as Reachability"],"prefix":"10.1109","author":[{"given":"S\u00e9bastien","family":"Gondron","sequence":"first","affiliation":[{"name":"Danmarks Tekniske Universitet,DTU Compute,Kgs. Lyngby,Danmark"}]},{"given":"Sebastian","family":"M\u00f6dersheim","sequence":"additional","affiliation":[{"name":"Danmarks Tekniske Universitet,DTU Compute,Kgs. Lyngby,Danmark"}]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[{"name":"King&#x0027;s College London,Department of Informatics,London,United Kingdom"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Automatic Verification of Privacy Properties in the Applied pi Calculus","author":"st\u00e9phanie","year":"0","journal-title":"IFIPTM"},{"key":"ref12","article-title":"A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols","author":"st\u00e9phanie","year":"2017","journal-title":"LAMP"},{"key":"ref23","article-title":"Analysis of DP3T","author":"vaudenay","year":"2020","journal-title":"Cryptology ePrint Archive"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91859-0_7"},{"journal-title":"DP-3T &#x2013; Decentralized Privacy-Preserving Proximity Tracing","year":"2020","key":"ref14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3289255"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.25"},{"key":"ref10","article-title":"Relating two standard notions of secrecy","author":"v\u00e9ronique","year":"2007","journal-title":"Log Methods Comput Sci"},{"key":"ref21","article-title":"Cryptographic approach to &#x201C;privacy-friendly&#x201D; tags","author":"ohkubo","year":"0","journal-title":"RFID Privacy Workshop"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.032"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3127586"},{"journal-title":"Herbrand Logic Tech rep","year":"2006","author":"hinrichs","key":"ref17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"ref19","article-title":"Assumptions and Guarantees for Compositional Non-interference","author":"mantel","year":"2011","journal-title":"CSF"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-020-09352-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2017.05.004"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.13"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00033"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00020"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2017.03.001"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LICS.2005.8"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930138"}],"event":{"name":"2022 IEEE 35th Computer Security Foundations Symposium (CSF)","start":{"date-parts":[[2022,8,7]]},"location":"Haifa, Israel","end":{"date-parts":[[2022,8,10]]}},"container-title":["2022 IEEE 35th Computer Security Foundations Symposium (CSF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9919409\/9919636\/09919668.pdf?arnumber=9919668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T23:13:18Z","timestamp":1699485198000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9919668\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/csf54842.2022.9919668","relation":{},"subject":[],"published":{"date-parts":[[2022,8]]}}}