{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:25Z","timestamp":1725549325103},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_14","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"106-113","source":"Crossref","is-referenced-by-count":0,"title":["Protocol Codesign"],"prefix":"10.1007","author":[{"given":"Hassen","family":"Sa\u00efdi","sequence":"first","affiliation":[]},{"given":"Victoria","family":"Stavridou","sequence":"additional","affiliation":[]},{"given":"Bruno","family":"Duterte","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"14_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"issue":"1","key":"14_CR2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: A modular approach. Journal of Computer Security (2003) (to appear)","DOI":"10.3233\/JCS-2004-12102"},{"key":"14_CR4","unstructured":"Kwiatkowska, M., Norman, G., Parker, D.: PRISM: Probabilistic symbolic model checker. Technical Report 760\/2001, University of Dortmund; also in Proc. PAPM\/PROBMIV 2001 Tools Session (September 2001)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Millen, J., Ruess, H.: Protocol-independent secrecy. In: RSP: 21th IEEE Computer Society Symposium on Research in Security and Privacy (2000)","DOI":"10.1109\/SECPRI.2000.848449"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. In: CRC Press series on discrete mathematics and its applications. CRC Press, Boca Raton (1996) ISBN 0-8493-8523-7","DOI":"10.1201\/9781439821916"},{"key":"14_CR7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"C.P. Lawrence","year":"1998","unstructured":"Lawrence, C.P.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"14_CR8","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M. Reiter","year":"1998","unstructured":"Reiter, M., Rubin, A.: Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security\u00a01(1), 66\u201392 (1998)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR9","unstructured":"Rushby, J.: Combining system properties: A cautionary example and formal examination. Technical report, Computer Science Laboratory, SRI International (June 1995)"},{"key":"14_CR10","unstructured":"Sa\u00efdi, H.: Towards automatic synthesis of security protocols. In: Logic- Based Program Synthesis Workshop. AAAI 2002 Spring Symposium, Stanford University, California (March 2002)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Shmatikov, V.: Probabilistic analysis of anonymity. In: Proc. 15th IEEE Computer Security Foundations Workshop, pp. 119\u2013128 (2002)","DOI":"10.1109\/CSFW.2002.1021811"},{"key":"14_CR12","unstructured":"Zhou, J.: Non-repudiation. PhD thesis, University of London (December 1996)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:17Z","timestamp":1605644297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11542322_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}