{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:01:21Z","timestamp":1725465681494},"publisher-location":"New York","reference-count":10,"publisher":"Springer-Verlag","isbn-type":[{"type":"print","value":"0387250913"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-26325-x_19","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T04:36:54Z","timestamp":1130128614000},"page":"187-196","source":"Crossref","is-referenced-by-count":0,"title":["A model-based approach to analysis of authentication protocols"],"prefix":"10.1007","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Olszewski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Burrows M., Abadi M. 1989. \u2018A logic of authentication'. Technical Report 39, Digital Systems Research Center.","DOI":"10.1145\/74850.74852"},{"key":"19_CR2","unstructured":"Roscoe A.W. 1998. \u2018The Theory and Practice of Concurrency'. Prentice-Hall, International Series in Computer Science, ISBN 0-13-674409-5."},{"key":"19_CR3","unstructured":"Ryan P.Y.A, Schneider S.A., Goldsmith M.H., Lowe G., Roscoe A.W. 2001. \u2018The Modelling and Analysis of Security Protocols: the CSP Approach'. Addison-Wesley, ISBN 0-201-67471-8."},{"key":"19_CR4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe G. 1998, \u2018Casper: A Compiler for the Analysis of Security Protocols'. Journal of Computer Security, Volume 6, pp. 53\u201384.","journal-title":"Journal of Computer Security"},{"key":"19_CR5","unstructured":"Object Management Group 2000. \u2018OMG Unified Modelling Language Specification ver. 1.3\u2019"},{"key":"19_CR6","unstructured":"Simoes P., Alves P., Rogado J., Ferreira P. 2000. \u2018An Authentication Protocol for Mobile Devices'. Advance Program for International Workshop on Internet 2000."},{"issue":"11","key":"19_CR7","first-page":"3902","volume":"E74","author":"S. Yamaguchi","year":"1991","unstructured":"Yamaguchi S., Okayama K., Miyahara H. 1991. \u2018The design and implementation of an authentication system for the wide area distributed environment'. IEICE Transactions on Information and Systems. E74(11):3902\u20133909.","journal-title":"IEICE Transactions on Information and Systems"},{"key":"19_CR8","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/0020-0190(94)00175-X","volume":"53","author":"T. Hwang","year":"1995","unstructured":"Hwang T., Yung-Hsiang Chen 1995. \u2018On the security of splice\/as: The authentication system in wide internet'. Information Processing Letters 53:97\u2013101.","journal-title":"Information Processing Letters"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"G\u00f3rski J., Jarz\u0119bowicz A., Leszczyna R., Miler J., Olszewski M. 2003. \u2018An Approach to Trust Case Development'. Lecture Notes in Computer Science 2788. Springer-Verlag. pp. 193\u2013206.","DOI":"10.1007\/978-3-540-39878-3_16"},{"key":"19_CR10","unstructured":"http:\/\/www.e-mathesis.it\/Drive\/, IST-DRIVE project's official website."}],"container-title":["Information Processing and Security Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-26325-X_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:42Z","timestamp":1605643362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-26325-X_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387250913"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/0-387-26325-x_19","relation":{},"subject":[]}}