{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:15:54Z","timestamp":1742912154537,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":23,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_1","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T04:49:39Z","timestamp":1140410979000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["A Role-based Specification of the SET Payment Transaction Protocol"],"prefix":"10.1007","author":[{"given":"Hideki","family":"Sakurada","sequence":"first","affiliation":[]},{"given":"Yasuyuki","family":"Tsukada","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/BFb0015258","volume":"1000","author":"R. Anderson","year":"1995","unstructured":"Anderson, R. and Needham, R. (1995). Programming satan\u2019s computer. In Computer Science Today: Recent Trends and Developments, volume 1000 of LNCS, pages 426\u2013440. Springer-Verlag.","journal-title":"Computer Science Today: Recent Trends and Developments"},{"key":"1_CR2","first-page":"159","volume":"1895","author":"G. Bella","year":"2000","unstructured":"Bella, G., Massacci, F., Paulson, L. C., and \u2019Tkamontano, P. (2000). Formal verification of cardholder registration in SET. In 6th European Symposium on Research in Computer Security (ESORICS\u201900), volume 1895 of LNCS, pages 159\u2013174. Springer-Verlag.","journal-title":"LNCS"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bolignano, D. (1997). Towards the formal verification of electronic commerce protocols. In 10th IEEE Computer Security Foundations Workshop, pages 133\u2013146.","DOI":"10.1109\/CSFW.1997.596802"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., and Needham, R. (1990). A logic of authentication. ACM Transactions on Computer Systems, 8(1):18\u201336.","journal-title":"ACM Transactions on Computer Systems"},{"key":"1_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45116-1_18","volume":"2052","author":"I. Cervesato","year":"2001","unstructured":"Cervesato, I. (2001a). Typed MSR: Syntax and examples. In Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security (MMM-ACNS\u201901), volume 2052 of LNCS, pages 159\u2013177. Springer-Verlag.","journal-title":"Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security (MMM-ACNS\u201901)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Cervesato, I. (2001b). Typed multiset rewriting specifications of security protocols. In 1s Irish Conference on the Mathematical Foundations of Computer Science and Information Technology (MFCSIT\u201900), ENTCS. Elsevier. To appear.","DOI":"10.1016\/S1571-0661(05)80035-0"},{"key":"1_CR7","unstructured":"Clark, J. and Jacob, J. (1997). A survey of authentication protocol literature: Version 1.0. Technical report, Department of Computer Science, University of York."},{"key":"1_CR8","unstructured":"Denker, G., Millen, J., and Rue\u00df, H. (2000). The CAPSL integrated protocol environment. SRI Technical Report SRI-CSL-2000-02, SRI International."},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Dolev, D. and Yao, A. C. (1981). On the security of public key protocols (extended abstract). In 22nd Annual Symposium on Foundations of Computer Science, pages 350\u2013357. IEEE.","DOI":"10.1109\/SFCS.1981.32"},{"key":"1_CR10","unstructured":"Formal Systems Ltd (1998). FDR2 user manual."},{"key":"1_CR11","unstructured":"Hoare, C. A. R. (1985). Communicating Sequential Processes. Prentice Hall."},{"key":"1_CR12","first-page":"345","volume":"1485","author":"V. Kessler","year":"1998","unstructured":"Kessler, V. and Neumann, H. (1998). A sound logic for analysing electronic commerce protocols. In 5th European Symposium on Research in Computer Security (ESORICS\u201998), volume 1485 of LNCS, pages 345\u2013360. Springer-Verlag.","journal-title":"LNCS"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Lu, S. and Smolka, S. (1999). Model checking SET Secure Electronic Transaction Protocol. In 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS\u201999), pages 358\u2013365. IEEE.","DOI":"10.1109\/MASCOT.1999.805074"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C. (1996). The NRL protocol analyzer: an overview. Journal of Logic Programming, 26(2):113\u2013131.","journal-title":"Journal of Logic Programming"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/BFb0055477","volume":"1465","author":"C. Meadows","year":"1998","unstructured":"Meadows, C. and Syverson, P. (1998). A formal specification of requirements for payment transactions in the SET protocol. In Financial Cryptography\u2019 98, volume 1465 of LNCS, pages 122\u2013140. Springer Verlag.","journal-title":"Financial Cryptography\u2019 98"},{"issue":"12","key":"1_CR16","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R. and Schroeder, M. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993\u2013999.","journal-title":"Communications of the ACM"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Paulson, L. C. (1994). Isabelle: A Generic Theorem Prover, volume 828 of LNCS. Springer-Verlag.","DOI":"10.1007\/BFb0030541"},{"issue":"1","key":"1_CR18","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. C. Paulson","year":"1998","unstructured":"Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85\u2013128.","journal-title":"Journal of Computer Security"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Roscoe, A. W. (1995). Modelling and verifying key-exchange protocols using CSP and FDR. In 8th IEEE Computer Security Foundations Workshop, pages 98\u2013107.","DOI":"10.1109\/CSFW.1995.518556"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Schneider, S. (1997). Verifying authentication protocols with CSP. In 10th IEEE Computer Security Foundations Workshop, pages 3\u201317.","DOI":"10.1109\/CSFW.1997.596775"},{"key":"1_CR21","unstructured":"SET Secure Electronic Transaction LLC (1997a). SET secure electronic transaction book 1: Business description."},{"key":"1_CR22","unstructured":"SET Secure Electronic Transaction LLC (1997b). SET secure electronic transaction book 2: Programmer\u2019s guide."},{"key":"1_CR23","unstructured":"SET Secure Electronic Transaction LLC (1997c). SET secure electronic transaction book 3: Formal protocol definition."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T20:47:02Z","timestamp":1555447622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}