{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:48:23Z","timestamp":1772930903135,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council (ERC)","award":["grant agreement No 645865-SPOOC"],"award-info":[{"award-number":["grant agreement No 645865-SPOOC"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133998","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"409-423","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["A Type System for Privacy Properties"],"prefix":"10.1145","author":[{"given":"V\u00e9ronique","family":"Cortier","sequence":"first","affiliation":[{"name":"CNRS, LORIA, Nancy, France"}]},{"given":"Niklas","family":"Grimm","sequence":"additional","affiliation":[{"name":"TU Wien, Vienna, Austria"}]},{"given":"Joseph","family":"Lallemand","sequence":"additional","affiliation":[{"name":"Inria, LORIA, Nancy, France"}]},{"given":"Matteo","family":"Maffei","sequence":"additional","affiliation":[{"name":"TU Wien, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","series-title":"NATO Science Series","volume-title":"Foundations of Secure Computation, F Bauer and R Steinbriiggen (Eds.)","author":"Abadi Mart\u00edn","unstructured":"Mart\u00edn Abadi. 2000. Security Protocols and their Properties. In Foundations of Secure Computation, F Bauer and R Steinbriiggen (Eds.). NATO Science Series, Vol. for the 20th International Summer School on Foundations of Secure Computation held in Marktoberdorf Germany. IOS Press, 39--60."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2003.12.023"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44929-9_1"},{"key":"e_1_3_2_2_5_1","volume-title":"Helios: Web-based Open-Audit Voting. In 17th USENIX Security symposium (SS'08)","author":"Adida Ben","year":"2008","unstructured":"Ben Adida. 2008. Helios: Web-based Open-Audit Voting. In 17th USENIX Security symposium (SS'08). USENIX Association, 335--348."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062378"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402514"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.15"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_13"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.26"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130493"},{"key":"e_1_3_2_2_13_1","volume-title":"Partial Order Reduction for Security Protocols. In 26th International Conference on Concurrency Theory (CONCUR'15)","volume":"42","author":"Baelde David","year":"2015","unstructured":"David Baelde, St\u00e9phanie Delaune, and Lucca Hirschi. 2015. Partial Order Reduction for Security Protocols. In 26th International Conference on Concurrency Theory (CONCUR'15) (LIPIcs), Vol. 42. Leibniz-Zentrum f\u00fcr Informatik, 497--510."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535847"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594834.1480894"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813662"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890028.1890031"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964003"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930138"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000004"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2007.06.002"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539700377864"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.13"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36830-1_6"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743018"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029135"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.8"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2007-15602"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-016-0361-7"},{"key":"e_1_3_2_2_30_1","volume-title":"Programming Languages and Systems -- 21th European Symposium on Programming (ESOP'12) (Lecture Notes in Computer Science)","author":"Chadha Rohit","unstructured":"Rohit Chadha, Stefan &gt;\u015etefan Ciob\u00e2c\u0103, and Steve Kremer. 2012. Automated Verification of Equivalence Properties of Cryptographic Protocols. In Programming Languages and Systems -- 21th European Symposium on Programming (ESOP'12) (Lecture Notes in Computer Science), Vol. 7211. Springer, Tallinn, Estonia, 108--127."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_50"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_50"},{"key":"e_1_3_2_2_33_1","unstructured":"John Clark and Jeremy Jacob. 1997. A Survey of Authentication Protocol Literature: Version 1.0. (1997)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455786"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.15"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46666-7_16"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.19"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133998"},{"key":"e_1_3_2_2_39_1","unstructured":"V\u00e9ronique Cortier Niklas Grimm Joseph Lallemand and Matteo Maffei. 2017. TypeEQ. Source Code. (Aug. 2017). https:\/\/secpriv.tuwien.ac.at\/tools\/typeeq"},{"key":"e_1_3_2_2_40_1","volume-title":"Relating Two Standard Notions of Secrecy","author":"Cortier V\u00e9ronique","unstructured":"V\u00e9ronique Cortier, Micha\u00ebl Rusinowitch, and Eugen Z\u0103linescu. 2006. Relating Two Standard Notions of Secrecy. Springer Berlin Heidelberg, 303--318."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.27"},{"key":"e_1_3_2_2_42_1","volume-title":"20th International Conference, CAV 2008","volume":"2008","author":"Cremers Cas J. F.","year":"2008","unstructured":"Cas J. F. Cremers. 2008. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA (Lecture Notes in Computer Science), Vol. 5123\/2008. Springer, 414--418."},{"key":"e_1_3_2_2_43_1","volume-title":"Automating Open Bisimulation Checking for the Spi Calculus. In 23rd IEEE Computer Security Foundations Symposium (CSF","author":"Dawson Jeremy","year":"2010","unstructured":"Jeremy Dawson and Alwen Tiu. 2010. Automating Open Bisimulation Checking for the Spi Calculus. In 23rd IEEE Computer Security Foundations Symposium (CSF 2010). IEEE Computer Society, 307--321."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0340"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.25"},{"key":"e_1_3_2_2_46_1","series-title":"Cryptology and Information Security Series","volume-title":"Formal Models and Techniques for Analyzing Security Protocols","author":"Focardi Riccardo","unstructured":"Riccardo Focardi and Matteo Maffei. 2011. Types for Security Protocols. In Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series, Vol. 5. IOS Press, Chapter 7, 143--181."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2003-11402"},{"key":"e_1_3_2_2_48_1","volume-title":"Program Equivalence, and Optimizations. arXiv:1703.00055. (July","author":"Grimm Niklas","year":"2017","unstructured":"Niklas Grimm, Kenji Maillard, C\u00e9dric Fournet, C\u0103t\u0103lin Hri\u0163cu, Matteo Maffei, Jonathan Protzenko, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, and Santiago Zanella-B\u00e9guelin. 2017. A Monadic Framework for Relational Verification: Applied to Information Security, Program Equivalence, and Optimizations. arXiv:1703.00055. (July 2017). https:\/\/arxiv.org\/abs\/1703.00055"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61042-1_43"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-014-0319-6"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.13"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2958031.2958047"},{"key":"e_1_3_2_2_53_1","unstructured":"Peter Roenne. 2016. Private communication. (2016)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_11"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.25"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908092"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.12.036"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":57,"alternative-id":["10.1145\/3133956.3133998","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133998","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}