{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:14Z","timestamp":1725475814459},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_17","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T21:04:09Z","timestamp":1167426249000},"page":"206-219","source":"Crossref","is-referenced-by-count":3,"title":["The PKI Specification Dilemma: A Formal Solution"],"prefix":"10.1007","author":[{"given":"Maris A.","family":"Ozols","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marie","family":"Henderson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chuchang","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tony","family":"Cant","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. In: Proceedings of the Royal Society of London, vol.\u00a0426, pp. 233\u2013271 (1989)","DOI":"10.1098\/rspa.1989.0125"},{"key":"17_CR2","unstructured":"Cryptlib. [Online], Technical Contact: Peter Gutmann, <\n                    \n                      http:\/\/www.datasec.co.nz\n                    \n                    \n                  >"},{"key":"17_CR3","unstructured":"DR 222. Defect Report Number DR 222: Certificate Policy Mapping (June 1999), Available from \n                    \n                      ftp:\/\/ftp.bull.com\/pub\/OSIdirectory\/DefectResolution\/DefectReports\/X.509\/"},{"key":"17_CR4","volume-title":"Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption","author":"W. Ford","year":"1997","unstructured":"Ford, W., Baum, M.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Englewood Cliffs (1997)"},{"key":"17_CR5","volume-title":"Introduction to HOL: A Theorem Proving Environment for Higher Order Logic","author":"M.J.C. Gordon","year":"1993","unstructured":"Gordon, M.J.C., Melham, T.F.: Introduction to HOL: A Theorem Proving Environment for Higher Order Logic. Cambridge University Press, Cambridge (1993)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, W., Solo, D.: RCF 2459, Internet X.509 Public Key Infrastructure - Part I: Certificate and CRL Profile. Internet Request for Comments 2459 (January 1999)","DOI":"10.17487\/rfc2459"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-46588-1_7","volume-title":"Public Key Cryptography","author":"C. Liu","year":"2000","unstructured":"Liu, C., Ozols, M.A., Henderson, M., Cant, T.: A state-based model for certificate management systems. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol.\u00a01751, pp. 75\u201392. Springer, Heidelberg (2000)"},{"key":"17_CR8","first-page":"150","volume-title":"Proceedings of the 23rd Australasian Computer Science Conference, ACSC 2000","author":"C. Liu","year":"2000","unstructured":"Liu, C., Ozols, M.A., Henderson, M., Cant, T.: Towards certificate verification in a certificate management system. In: Edwards, J. (ed.) Proceedings of the 23rd Australasian Computer Science Conference, ACSC 2000, Canberra, Australia, pp. 150\u2013157. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocols using CSP and FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-68339-9","volume-title":"Computer Security - ESORICS 1996","author":"U. Maurer","year":"1996","unstructured":"Maurer, U.: Modeling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146. Springer, Heidelberg (1996)"},{"key":"17_CR11","unstructured":"Mulvenna, J., Keys, L., Walters, D., Ganta, S., Gupta, S.: Characteristics and attributes that affect S\/MIME product interoperability, Draft available from \n                    \n                      http:\/\/csrc.nist.gov\/pki\/smime\/welcome.htm"},{"key":"17_CR12","unstructured":"NIST. Digital Signature Standard (DSS). Federal Information Processing Standards Publication 186 (November 1994)"},{"key":"17_CR13","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511811326","volume-title":"ML for Working Programmer","author":"L.C. Paulson","year":"1996","unstructured":"Paulson, L.C.: ML for Working Programmer, 2nd edn. Cambridge University Press, Cambridge (1996)","edition":"2"},{"issue":"1-2","key":"17_CR14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"17_CR15","unstructured":"Paulson, L.C.: The Isabelle Reference Manual. University of Cambridge, Computer Laboratory, available from \n                    \n                      http:\/\/www.in.tum.de\/isabelle\/dist"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Reiter, M.K., Stubblebine, S.G.: Path independence for authentication inlarge- scale systems. In: Proceedings of the 4th ACM Conference on Computer and Communication Security, pp. 57\u201366 (April 1997)","DOI":"10.1145\/266420.266435"},{"key":"17_CR17","unstructured":"Reiter, M.K., Stubblebine, S.G.: Toward acceptable metrics of authentication. In: Proceedings of the IEEE Symposium on Security and Privacy (May 1997)"},{"key":"17_CR18","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/CSFW.1995.518556","volume-title":"8th Computer Security Foundation Workshop","author":"A.W. Roscoe","year":"1995","unstructured":"Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: 8th Computer Security Foundation Workshop, pp. 98\u2013107. IEEE Computer Society Press, Los Alamitos (1995)"},{"key":"17_CR19","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)","edition":"2"},{"key":"17_CR20","unstructured":"X.509. Information Technology - Open systems Interconnection - The Directory: Authentication Framework. ITU-T Recommendation X.509 (June 1997)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:11:54Z","timestamp":1558300314000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/10718964_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}