{"id":1239,"date":"2023-05-17T13:20:58","date_gmt":"2023-05-17T11:20:58","guid":{"rendered":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/"},"modified":"2023-05-17T13:20:58","modified_gmt":"2023-05-17T11:20:58","slug":"phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/","title":{"rendered":"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p>You are cordially invited to attend the hybrid PhD Defence of \u00a0<strong>Semen YURKOV<\/strong>\u00a0on\u00a0<strong>15 June at 2 p.m. on Belval Campus, at MSA\u00a0Room 3.160. <\/strong>The\u00a0defence is available also online via <a href=\"https:\/\/unilu.webex.com\/unilu\/j.php?MTID=mcb9e296a56e5d48863ff0b5e55f7351f\" target=\"_self\" title=\"\" rel=\"noopener\">Webex.<\/a><\/p><p><strong>Members of the defense committee:<\/strong><\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Chair:\u00a0Prof. Dr Peter Y A Ryan, University of Luxembourg<\/li><li class=\"ulux-list-item\">Vice-chair:\u00a0Dr Ross James Horne, University of Luxembourg<\/li><li class=\"ulux-list-item\">Supervisor:\u00a0Prof. Dr Sjouke Mauw, University of Luxembourg<\/li><li class=\"ulux-list-item\">Member:\u00a0Prof. Dr Ioana Boureanu, University of Surrey, United Kingdom<\/li><li class=\"ulux-list-item\">Member:\u00a0Prof. Dr Sebastian M\u00f6dersheim, Technical University of Denmark, Denmark<\/li><\/ul><p><strong>Abstract:\u00a0<\/strong><\/p><p>Cryptographic protocols are instructions explaining how the communication between agents should be done. Critical infrastructure sectors, such as communication networks, financial services, information technology, transportation, etc., use security protocols at their very core to establish the information exchange between the components of the system. Symbolic verification is a discipline that investigates whether a given protocol satisfies the initial requirements and delivers exactly what it intends to deliver. An immediate goal of symbolic verification is to improve the reliability of existing systems &#8212; if a protocol is vulnerable, actions must be taken asap before a malicious attacker exploits it, and a far-reaching goal &#8212; when designing a new protocol, it must be proven correct before the implementation. Properties of cryptographic protocols roughly fall into two categories. Either reachability-based, i.e. that a system can or cannot reach a state satisfying some condition, or equivalence-based, i.e. that a system is indistinguishable from the idealised system, where the desired property trivially holds. Security properties are often formulated as a reachability problem and privacy properties as an equivalence problem. While the study of security properties is relatively settled, and powerful tools like Tamarin and ProVerif, where it is possible to check reachability queries, exist, the study of privacy properties expressed as equivalence only starts gaining momentum. Tools like DeepSec, Akiss and, again, ProVerif offer only limited support when it comes to indistinguishability. This is partially due to the question of \u00ab\u00a0What is an attacker capable of?\u00a0\u00bb is not answered definitively in the second case. The widely-accepted default attacker, when it comes to security, is the so-called Dolev-Yao attacker, which has full control of the communication network; however, there is no default attacker who attempts to break the privacy of a protocol. The capabilities of such an attacker are reflected in the equivalence relation used to define a privacy property; hence the choice of such relation is crucial.\u00a0<\/p><p>This dissertation justifies a particular equivalence relation called quasi-open bisimilarity which satisfies several natural requirements. It has sound and complete modal logic characterisation, meaning that any attack on privacy has a practical interpretation; it enables compositional reasoning, meaning that if a privacy property of a system automatically extends to a bigger system having the initial one as a component, and, it captures the capability of an attacker to make decisions dynamically during the execution of the protocol. We not only explain the notion of quasi-open bisimilarity, but we also employ it to study real-world protocols. The first protocol, UBDH, is an authenticated key agreement suitable for card payments, and the second protocol, UTX, is a smartcard-based payment protocol. Using quasi-open bisimilarity, we define the target privacy property of unlinkability, namely that it is impossible to link protocol sessions made with the same card and prove that it holds for UBDH and UTX. The proofs that UBDH and UTX satisfy their privacy requirements to our knowledge are the first ones that demonstrate that a privacy property of a security protocol, defined as bisimilarity equivalence, is satisfied for an unbounded number of protocol sessions. Moreover, these proofs illustrate the methodology that could be employed to study the privacy of other protocols.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>You are cordially invited to attend the hybrid PhD Defence of \u00a0Semen YURKOV\u00a0on\u00a015 June at 2 p.m. on Belval Campus, at MSA\u00a0Room 3.160. The\u00a0defence is available also online via Webex.<\/p>\n","protected":false},"author":0,"featured_media":1240,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2023-06-15 14:00:00","event_end_date":"2023-06-15 15:30:00","event_speaker_name":"Semen YURKOV","event_speaker_link":"","event_is_online":false,"event_location":"Belval Campus, MSA Room 3.160","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity - SnT - Universit\u00e9 du Luxembourg I Uni.lu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity\" \/>\n<meta property=\"og:description\" content=\"You are cordially invited to attend the hybrid PhD Defence of \u00a0Semen YURKOV\u00a0on\u00a015 June at 2 p.m. on Belval Campus, at MSA\u00a0Room 3.160. The\u00a0defence is available also online via Webex.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/\",\"name\":\"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity - SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg\",\"datePublished\":\"2023-05-17T11:20:58+00:00\",\"dateModified\":\"2023-05-17T11:20:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"],\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity - SnT - Universit\u00e9 du Luxembourg I Uni.lu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity","og_description":"You are cordially invited to attend the hybrid PhD Defence of \u00a0Semen YURKOV\u00a0on\u00a015 June at 2 p.m. on Belval Campus, at MSA\u00a0Room 3.160. The\u00a0defence is available also online via Webex.","og_url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/","og_site_name":"SnT FR","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/","url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/","name":"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity - SnT - Universit\u00e9 du Luxembourg I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg","datePublished":"2023-05-17T11:20:58+00:00","dateModified":"2023-05-17T11:20:58+00:00","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2023\/05\/phd_defence_analysis_of_smartcard_based_payment_protocols_in_the_applied_pi_calculus_using_quasi_open_bisimilarity.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defence-analysis-of-smartcard-based-payment-protocols-in-the-applied-pi-calculus-using-quasi-open-bisimilarity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/snt-fr\/events\/"},{"@type":"ListItem","position":4,"name":"PhD Defence: Analysis of Smartcard-based Payment Protocols in the Applied Pi-calculus using Quasi-Open Bisimilarity"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"],"description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu"}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/1239"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/1240"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-topic?post=1239"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-type?post=1239"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}