This review provides an overview of the current state of the field of anonymity research with particular reference to the formal specification of anonymity as a security propert
International audienceThe protection of users' data conforming to best practice and legislation is o...
This doctoral thesis consists of five research papers that address four tangential topics, all of wh...
The use of formal methods to verify security protocols with respect to secrecy and authentication ha...
This review provides an overview of the current state of the field of anonymity research with partic...
This review provides an overview of the current state of the field of anonymity research with partic...
We consider several notions of anonymity and privacy and develop formal definitions of what it mean...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
In electronic communications today, multiple diverse connected devices are used, and messages and da...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
This contribution address the problem with an interdisciplinary approach, in the aim to encourage th...
Security protocols are designed to meet particular security properties. In order to analyse such pro...
The central aim of the thesis is to cast light on the status of Anonymity. I try to provide an ove...
Talk of anonymity floats freely and, in many contexts, rampantly in everyday, nonphilosophical disco...
Abstract. Security protocols play more and more important role with widely use in many applications ...
International audienceThe protection of users' data conforming to best practice and legislation is o...
This doctoral thesis consists of five research papers that address four tangential topics, all of wh...
The use of formal methods to verify security protocols with respect to secrecy and authentication ha...
This review provides an overview of the current state of the field of anonymity research with partic...
This review provides an overview of the current state of the field of anonymity research with partic...
We consider several notions of anonymity and privacy and develop formal definitions of what it mean...
In this work, the authors analyze the concept and definitions of anonymity in the modern connected w...
In electronic communications today, multiple diverse connected devices are used, and messages and da...
. Security protocols are designed to meet particular security properties. In order to analyse such p...
This contribution address the problem with an interdisciplinary approach, in the aim to encourage th...
Security protocols are designed to meet particular security properties. In order to analyse such pro...
The central aim of the thesis is to cast light on the status of Anonymity. I try to provide an ove...
Talk of anonymity floats freely and, in many contexts, rampantly in everyday, nonphilosophical disco...
Abstract. Security protocols play more and more important role with widely use in many applications ...
International audienceThe protection of users' data conforming to best practice and legislation is o...
This doctoral thesis consists of five research papers that address four tangential topics, all of wh...
The use of formal methods to verify security protocols with respect to secrecy and authentication ha...