{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:33Z","timestamp":1725549333915},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_23","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"183-189","source":"Crossref","is-referenced-by-count":0,"title":["Is the Verification Problem for Cryptographic Protocols Solved?"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Cristiano","family":"Longo","sequence":"additional","affiliation":[]},{"given":"Lawrence C.","family":"Paulson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: Design and implementation. In: Proceedings of the 11th International Conference on Wold Wide Web (WWW 2002). ACM Press and Addison Wesley (2002)","DOI":"10.1145\/511446.511497"},{"key":"23_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology\u00a015, 103\u2013127 (2002)","journal-title":"Journal of Cryptology"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Abdallah, A., Ryan, P., Schneider, S. (eds.): Formal Aspects of Security, Technical Report CSD-TR-02-13 (2002)","DOI":"10.1007\/b94774"},{"key":"23_CR4","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library. preprint, IBM Z\u00fcrich Research Laboratory (2003)"},{"issue":"1","key":"23_CR5","first-page":"87","volume":"11","author":"G. Bella","year":"2003","unstructured":"Bella, G.: Inductive verification of smart card protocols. J. of Comp. Sec.\u00a011(1), 87\u2013132 (2003)","journal-title":"J. of Comp. Sec."},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/10930755_23","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Bella","year":"2003","unstructured":"Bella, G., Longo, C., Paulson, L.C.: Verifying second-level security protocols. In: Basin, D., Wolff, B. (eds.) TPHOLs 2003. LNCS, vol.\u00a02758, pp. 352\u2013366. Springer, Heidelberg (2003)"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/586110.586113","volume-title":"9th ACM Conference on Computer and Communications Security","author":"G. Bella","year":"2002","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: The verification of an industrial payment protocol: The SET purchase phase. In: Atluri, V. (ed.) 9th ACM Conference on Computer and Communications Security, pp. 12\u201320. ACM Press, New York (2002)"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Bella","year":"1998","unstructured":"Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 361\u2013375. Springer, Heidelberg (1998)"},{"key":"23_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44755-5_8","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Bella","year":"2001","unstructured":"Bella, G., Paulson, L.C.: Mechanical proofs about a non-repudiation protocol. In: Boulton, R.J., Jackson, P.B. (eds.) TPHOLs 2001. LNCS, vol.\u00a02152, pp. 91\u2013104. Springer, Heidelberg (2001)"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. Proceedings of the Royal Society of London\u00a0426, 233\u2013271 (1989)","journal-title":"Proceedings of the Royal Society of London"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/CSFW.2000.856933","volume-title":"Proc. of the 13th IEEE Comp. Sec. Found. Workshop","author":"E. Cohen","year":"2000","unstructured":"Cohen, E.: TAPS: A first-order verifier for cryptographic protocols. In: Proc. of the 13th IEEE Comp. Sec. Found. Workshop, pp. 144\u2013158. IEEE Comp. Society Press, Los Alamitos (2000)"},{"key":"23_CR12","unstructured":"G\u00fcrgens, S., Rudolph, C.: Security analysis of (un-) fair non-repudiation protocols. In: Abdallah, et al. (eds.) [3] Technical Report CSD-TR-02-13"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Lowe, G., Roscoe, B.: Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. on Software Engineering\u00a03(10) (1997)","DOI":"10.1109\/32.637148"},{"issue":"12","key":"23_CR15","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.: Using encryption for authentication in large networks of computers. Comm. of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Comm. of the ACM"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Norman, G., Shmatikov, V.: Analysis of probabilistic contract signing. In: Abdallah, et al. (eds.) [3] Technical Report CSD-TR-02-13","DOI":"10.1007\/978-3-540-40981-6_9"},{"key":"23_CR17","first-page":"85","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. of Comp. Sec.\u00a06, 85\u2013128 (1998)","journal-title":"J. of Comp. Sec."},{"issue":"3","key":"23_CR18","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"L.C. Paulson","year":"1999","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. on Inform. and Sys. Sec.\u00a02(3), 332\u2013351 (1999)","journal-title":"ACM Trans. on Inform. and Sys. Sec."},{"key":"23_CR19","volume-title":"Symposium on Security and Privacy","author":"J. Zhou","year":"1996","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Symposium on Security and Privacy. IEEE Computer Society, Los Alamitos (1996)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:19Z","timestamp":1605644299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11542322_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}