Dong, Naipeng ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Jonker, Hugo ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Pang, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations
Publication date :
2013
Event name :
18th European Symposium on Research in Computer Security
Event place :
Egham, United Kingdom
Event date :
September 9-13, 2013
Audience :
International
Main work title :
Proceedings of the 18th European Symposium on Research in Computer Security
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1(1), 66-92 (1998)
van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1-15. Springer, Heidelberg (2008)
Arapinis, M., Chothia, T., Ritter, E., Ryan, M.D.: Analysing unlinkability and anonymity using the applied pi calculus. In: Proc. 23rd CSF, pp. 107-121. IEEE (2010)
Bohli, J., Pashalidis, A.: Relations among privacy notions. ACM Transactions on Information and System Security 14(1), 4:1-4:24 (2011)
Jonker, H.L., Pang, J.: Bulletin boards in voting systems: Modelling and measuring privacy. In: Proc. 6th ARES, pp. 294-300. IEEE (2011)
Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proc. 26th STOC, pp. 544-553. ACM (1994)
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proc. 4th WPES, pp. 61-70. ACM (2005)
De Decker, B., Layouni, M., Vangheluwe, H., Verslype, K.: A privacy-preserving eHealth protocol compliant with the Belgian healthcare system. In: Mjølsnes, S.F., Mauw, S., Katsikas, S.K. (eds.) EuroPKI 2008. LNCS, vol. 5057, pp. 118-133. Springer, Heidelberg (2008)
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4), 435-487 (2009)
Dong, N., Jonker, H., Pang, J.: Analysis of a receipt-free auction protocol in the applied pi calculus. In: Degano, P., Etalle, S., Guttman, J. (eds.) FAST 2010. LNCS, vol. 6561, pp. 223-238. Springer, Heidelberg (2011)
Dong, N., Jonker, H., Pang, J.: Formal analysis of privacy in an eHealth protocol. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 325-342. Springer, Heidelberg (2012)
Dong, N., Jonker, H., Pang, J.: Challenges in eHealth: From enabling to enforcing privacy. In: Liu, Z., Wassyng, A. (eds.) FHIES 2011. LNCS, vol. 7151, pp. 195-206. Springer, Heidelberg (2012)
Dreier, J., Lafourcade, P., Lakhnech, Y.: Vote-independence: A powerful privacy notion for voting protocols. In: Garcia-Alfaro, J., Lafourcade, P. (eds.) FPS 2011. LNCS, vol. 6888, pp. 164-180. Springer, Heidelberg (2012)
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multi-party contract signing. In: Proc. 17th CSFW, pp. 266-279. IEEE (2004)
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. 14th CSFW, pp. 82-96. IEEE (2001)
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008)
Cheval, V., Blanchet, B.: Proving more observational equivalences with ProVerif. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 226-246. Springer, Heidelberg (2013)
Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: Proc. 25th S&P, pp. 86-100. IEEE (2004)
Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198-207 (1983)
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005) (Pubitemid 41274058)
Dahl, M., Delaune, S., Steel, G.: Formal analysis of privacy for anonymous location based services. In: Mödersheim, S., Palamidessi, C. (eds.) TOSCA 2011. LNCS, vol. 6993, pp. 98-112. Springer, Heidelberg (2012)
Dreier, J., Lafourcade, P., Lakhnech, Y.: Defining privacy for weighted votes, single and multi-voter coercion. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 451-468. Springer, Heidelberg (2012)
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. 28th POPL, pp. 104-115. ACM (2001)
Küsters, R., Truderung, T.: An epistemic approach to coercion-resistance for electronic voting protocols. In: Proc. 30th S&P, pp. 251-266. IEEE (2009)
Dong, N., Jonker, H.L., Pang, J.: Enforcing privacy in the presence of others: Notions, formalisations and relations. Technical report, University of Luxembourg (2013), http://satoss.uni.lu/projects/epriv/