{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:13Z","timestamp":1725557833594},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540406648"},{"type":"electronic","value":"9783540451303"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/10930755_23","type":"book-chapter","created":{"date-parts":[[2006,6,19]],"date-time":"2006-06-19T15:27:09Z","timestamp":1150730829000},"page":"352-366","source":"Crossref","is-referenced-by-count":12,"title":["Verifying Second-Level Security Protocols"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Longo","sequence":"additional","affiliation":[]},{"given":"Lawrence C","family":"Paulson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44898-5_17","volume-title":"Static Analysis","author":"M. Abadi","year":"2003","unstructured":"Abadi, M., Blanchet, B.: Computer-Assisted Verification of a Protocol for Certified Email. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694. Springer, Heidelberg (2003)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: Design and implementation. In: Proceedings of the 11th International Conference on Wold Wide Web (WWW 2002). ACM Press and Addison Wesley (2002)","DOI":"10.1145\/511495.511497"},{"key":"23_CR3","volume-title":"Proc. of the 17th IEEE Sym. on Sec. and Privacy","author":"N. Asokan","year":"1998","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: Proc. of the 17th IEEE Sym. on Sec. and Privacy. IEEE Comp. Society Press, Los Alamitos (1998)"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-48749-2_9","volume-title":"Secure Internet Programming","author":"T. Aura","year":"1999","unstructured":"Aura, T.: Distributed access-rights management with delegation certificates. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol.\u00a01603, pp. 211\u2013235. Springer, Heidelberg (1999)"},{"issue":"1","key":"23_CR5","first-page":"87","volume":"11","author":"G. Bella","year":"2003","unstructured":"Bella, G.: Inductive verification of smart card protocols. J. of Comp. Sec.\u00a011(1), 87\u2013132 (2003)","journal-title":"J. of Comp. Sec."},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/JSAC.2002.806133","volume":"21","author":"G. Bella","year":"2003","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE J. of Selected Areas in Communications\u00a021(1), 77\u201387 (2003)","journal-title":"IEEE J. of Selected Areas in Communications"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44755-5_8","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Bella","year":"2001","unstructured":"Bella, G., Paulson, L.C.: Mechanical proofs about a non-repudiation protocol. In: Boulton, R.J., Jackson, P.B. (eds.) TPHOLs 2001. LNCS, vol.\u00a02152, pp. 91\u2013104. Springer, Heidelberg (2001)"},{"key":"23_CR8","volume-title":"Proc. of the 14th IEEE Comp. Sec. Found. Workshop","author":"B. Blanchet","year":"1998","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. of the 14th IEEE Comp. Sec. Found. Workshop. IEEE Comp. Society Press, Los Alamitos (1998)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London\u00a0426, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London"},{"key":"23_CR10","unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0. Technical report, University of York, Department of Computer Science (November 1997), Available on the web at http:\/\/www-users.cs.york.ac.uk\/~jac\/ , A complete specification of the Clark-Jacob library in CAPSL is available at http:\/\/www.cs.sri.com\/~millen\/capsl\/"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/CSFW.2000.856933","volume-title":"Proc. of the 13th IEEE Comp. Sec. Found. Workshop","author":"E. Cohen","year":"2000","unstructured":"Cohen, E.: TAPS: A first-order verifier for cryptographic protocols. In: Proc. of the 13th IEEE Comp. Sec. Found. Workshop, pp. 144\u2013158. IEEE Comp. Society Press, Los Alamitos (2000)"},{"key":"23_CR12","volume-title":"Proc. of the 17th IEEE Sym. on Sec. and Privacy","author":"F.J.T. F\u00e1brega","year":"1998","unstructured":"F\u00e1brega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand Spaces: Why is a Security Protocol Correct? In: Proc. of the 17th IEEE Sym. on Sec. and Privacy. IEEE Comp. Society Press, Los Alamitos (1998)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"23_CR14","first-page":"85","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. of Comp. Sec.\u00a06, 85\u2013128 (1998)","journal-title":"J. of Comp. Sec."},{"issue":"3","key":"23_CR15","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"L.C. Paulson","year":"1999","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. on Inform. and Sys. Sec.\u00a02(3), 332\u2013351 (1999)","journal-title":"ACM Trans. on Inform. and Sys. Sec."},{"key":"23_CR16","volume-title":"The Modelling and Analysis of Security Protocols: the CSP Approach","author":"P.Y.A. Ryan","year":"2000","unstructured":"Ryan, P.Y.A., Schneider, S.A.: The Modelling and Analysis of Security Protocols: the CSP Approach. Addison Wesley Publ. Co., Reading (2000)"},{"key":"23_CR17","unstructured":"Shmatikov, V., Mitchell, J.C.: Analysis of a fair exchange protocol. In: Network and Distributed System Security Symposium, NDSS 2000 (2000)"},{"key":"23_CR18","volume-title":"Symposium on Security and Privacy","author":"J. Zhou","year":"1996","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos (1996)"}],"container-title":["Lecture Notes in Computer Science","Theorem Proving in Higher Order Logics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10930755_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T12:24:11Z","timestamp":1555676651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10930755_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540406648","9783540451303"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/10930755_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}