BEC782B9-9644-4C57-8312-D25C8869930EVerifying anonymity and privacy properties of security protocolsResearch GrantEP/E040829/1798CB33D-C79E-4578-83F2-72606407192CEPSRCINCOME_ACTUAL13476190992269-9C46-4A20-B76F-3D1B9624F782Anonymity Protocol with Identity Escrow and Analysis in the Applied pi-calculusAnonymity Protocol with Identity Escrow and Analysis in the Applied pi-calculus8499530abb4fbc1706ce1b03c4bae957Aybek Mukhamedov2007-01-01Conference/Paper/Proceeding/Abstractr_414136226463db5d64