{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T16:10:04Z","timestamp":1736007004090,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_2","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"3-10","source":"Crossref","is-referenced-by-count":2,"title":["A Protocol\u2019s Life After Attacks..."],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Stefano","family":"Bistarelli","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-39871-4_10","volume-title":"Security Protocols","author":"G. Bella","year":"2004","unstructured":"Bella, G., Bistarelli, S.: Confidentiality levels and deliberate\/indeliberate protocol attacks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol.\u00a02845, pp. 104\u2013119. Springer, Heidelberg (2004)"},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic for authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"issue":"4","key":"2_CR3","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1145\/383779.383785","volume":"2","author":"L.C. Aiello","year":"2001","unstructured":"Aiello, L.C., Massacci, F.: Verifying security protocols as planning in logic programming. ACM Transactions on Computational Logic\u00a02(4), 542\u2013580 (2001)","journal-title":"ACM Transactions on Computational Logic"},{"key":"2_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning about Knowledge","author":"R. Fagin","year":"1995","unstructured":"Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning about Knowledge. The MIT Press, Cambridge (1995)"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF00197942","volume":"7","author":"R. Kemmerer","year":"1994","unstructured":"Kemmerer, R., Meadows, C., Millen, J.: Three system for cryptographic protocol analysis. Journal of Cryptology\u00a07(2), 79\u2013130 (1994)","journal-title":"Journal of Cryptology"},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"2_CR7","first-page":"141","volume-title":"Proceedings of the 16th IEEE Symposium on Security and Privacy","author":"J. Mitchell","year":"1997","unstructured":"Mitchell, J., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using Murphi. In: Proceedings of the 16th IEEE Symposium on Security and Privacy, pp. 141\u2013151. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"issue":"9","key":"2_CR9","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/32.629493","volume":"23","author":"R. Focardi","year":"1997","unstructured":"Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering\u00a023(9), 550\u2013571 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR10","first-page":"174","volume-title":"Proceedings of the 15th IEEE Symposium on Security and Privacy","author":"S. Schneider","year":"1996","unstructured":"Schneider, S.: Security properties and CSP. In: Proceedings of the 15th IEEE Symposium on Security and Privacy, pp. 174\u2013187. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"2_CR11","volume-title":"Proceedings of the 12th IEEE Computer Security Foundations Workshop","author":"D. Song","year":"1999","unstructured":"Song, D.: Athena: An automatic checker for security protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"2_CR12","volume-title":"Proceedings of the 11th IEEE Computer Security Foundations Workshop","author":"F. Thayer Fabrega","year":"1998","unstructured":"Thayer Fabrega, F., Herzog, J., Guttman, J.: Honest ideals on strand spaces. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1998)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T15:33:45Z","timestamp":1736004825000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11542322_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}