{"title":"Security Goals and Protocol Transformations","authors":"J. Guttman","doi":"10.1007/978-3-642-27375-9_8","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_8","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"49 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Analysis of Privacy for Anonymous Location Based Services","authors":"Morten Dahl, S. Delaune, G. Steel","doi":"10.1007/978-3-642-27375-9_6","DOIUrl":"https://doi.org/10.1007/978-3-642-27375-9_6","url":null,"abstract":"","PeriodicalId":416840,"journal":{"name":"Joint Workshop on Theory of Security and Applications","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116988117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}