{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:19Z","timestamp":1725549319427},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_10","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"63-73","source":"Crossref","is-referenced-by-count":0,"title":["Client v. Server Side Protocols, Interfaces and Storage"],"prefix":"10.1007","author":[{"given":"Geraint","family":"Price","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"XML Key Management Specification (XKMS 2.0). W3C Working Draft (March 2002), http:\/\/www.w3.org\/TR\/xkms2\/"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. Technical Report 125, Digital Equipment Corporation Systems Research Centre (June 1994)","DOI":"10.1109\/RISP.1994.296587"},{"key":"10_CR3","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"246","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London\u00a0246, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1007\/3-540-36532-X_21","volume-title":"Software Security \u2013 Theories and Systems","author":"R. Canetti","year":"2003","unstructured":"Canetti, R., Meadows, C., Syverson, P.F.: Environmental requirements for authentication protocols. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 338\u2013355. Springer, Heidelberg (2003)"},{"key":"10_CR5","unstructured":"Cripso, B.: Delegation protocols for electronic commerce. In: Proceedings of the 6th IEEE Symposium on Computers and Communications (July 2001)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Crispo, B., Ruffo, G.: Reasoning about Accountability within Delegation. In: Proceedings of ICICS 2001:3rd International Conference on Information and Communications Security (November 2001)","DOI":"10.1007\/3-540-45600-7_29"},{"key":"10_CR7","unstructured":"Gong, L.: Fail-stop protocols: An approach to designing secure protocols. Technical Report SRI-CSL-94-14, S.R.I. International Computer Science Laboratory, S.R.I. International, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493 (October 1994)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Kain, K., Smith, S.W., Asokan, R.: Digital signatures and electronic documents: a cautionary tale. In: Sixth IFIP Conference on Communications and Multimedia Security (September 2002)","DOI":"10.1007\/978-0-387-35612-9_22"},{"key":"10_CR9","first-page":"93","volume":"17","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using fdr. Software - Concepts and Tools\u00a017, 93\u2013102 (1996)","journal-title":"Software - Concepts and Tools"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. IETF RFC 2560 (June 1999), http:\/\/www.ietf.org\/rfc\/rfc2560.txt","DOI":"10.17487\/rfc2560"},{"issue":"12","key":"10_CR11","first-page":"993","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the A.C.M.\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the A.C.M."},{"key":"10_CR12","unstructured":"Price, G.: The Interaction between Fault Tolerance and Security. Technical Report 479, University of Cambridge, Computer Laboratory (December 1999)"},{"key":"10_CR13","unstructured":"Roe, M.: Cryptography and Evidence. PhD thesis, University of Cambridge (1997), Available from http:\/\/research.microsoft.com\/users\/mroe\/"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Syverson, P.: A taxonomy of replay attacks. In: Proceedings of the Computer Security Foundations Workshop VII, pp. 187\u2013191 (1994)","DOI":"10.1109\/CSFW.1994.315935"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Syverson, P., Meadows, C.: A logical language for specifying cryptographic protocol requirements. In: Proceeedings of the 1993 IEEE Symposium on Research in Security and Privacy (May 1993)","DOI":"10.1109\/RISP.1993.287634"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/BFb0053447","volume-title":"Advances in Cryptology - EUROCRYPT 1994","author":"P.F. Syverson","year":"1995","unstructured":"Syverson, P.F., Meadows, C.: Formal requirements for key distribution protocols. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950, pp. 320\u2013331. Springer, Heidelberg (1995)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., van Oorschot, P.C.: A Unified Cryptographic Protocol Logic. Technical Report NRL CHACS Report 5540-227, Naval Research Laboratory, Center for High Assurance Computer Systems (1996)","DOI":"10.21236\/ADA464967"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:17Z","timestamp":1605644297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11542322_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}