{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:48Z","timestamp":1725549348368},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_8","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"49-54","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Framework for Autonomic Security Protocols"],"prefix":"10.1007","author":[{"given":"Simon N.","family":"Foley","sequence":"first","affiliation":[]},{"given":"Hongbin","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/266420.266432","volume-title":"Fourth ACM Conference on Computer and Communications Security","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Fourth ACM Conference on Computer and Communications Security, pp. 36\u201347. ACM Press, New York (1997)"},{"issue":"1","key":"8_CR2","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1147\/sj.421.0005","volume":"42","author":"A.G. Ganek","year":"2003","unstructured":"Ganek, A.G., Corbi, T.A.: The dawning of the autonomic computing era. IBM Systems Journal\u00a042(1), 5\u201318 (2003)","journal-title":"IBM Systems Journal"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Aura, T.: Strategies against replay attacks. In: Computer Security Foundations Workshop, pp. 29\u201368 (1997)","DOI":"10.1109\/CSFW.1997.596787"},{"key":"8_CR4","first-page":"153","volume-title":"Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW 1998)","author":"L. Butty\u00e1n","year":"1998","unstructured":"Butty\u00e1n, L., Staamann, S., Wilhelm, U.: A simple logic for authentication protocol design. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW 1998), Washington - Brussels - Tokyo, June 1998, pp. 153\u2013163. IEEE, Los Alamitos (1998)"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/SECPRI.2000.848447","volume-title":"proceedings of 2000 IEEE Symposium on Security and Privacy (SP 2000)","author":"J.A. Clark","year":"2000","unstructured":"Clark, J.A., Jacob, J.L.: Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols. In: Proceedings of 2000 IEEE Symposium on Security and Privacy (SP 2000), pp. 82\u201395. IEEE Computer Society, Los Alamitos (2000)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/RISP.1990.63854","volume-title":"Proceedings 1990 IEEE Symposium on Research in Security and Privacy","author":"L. Gong","year":"1990","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning About Belief in Cryptographic Protocols. In: Cooper, D., Lunt, T. (eds.) Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pp. 234\u2013248. IEEE Computer Society, Los Alamitos (1990)"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/CSFW.2002.1021809","volume-title":"proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"J.D. Guttman","year":"2002","unstructured":"Guttman, J.D.: Security protocol design via authentication tests. In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW 2002), pp. 92\u2013103. IEEE Computer Society, Los Alamitos (2002)"},{"key":"8_CR8","unstructured":"Sun\u00a0Microsystem Inc. Jini technology core platform specification version 1.2 (November 2001), \n                  \n                    http:\/\/www.jini.org"},{"key":"8_CR9","unstructured":"Kindred, D., Wing, J.M.: Theory generation for security protocols. In: ACM TOPLAS (July 1999)"},{"key":"8_CR10","unstructured":"O\u2019Crualaoich, D., Foley, S.N.: Theory generation for the simple logic. Technical report, University College Cork (in preparation)"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/CSFW.2000.856926","volume-title":"proceedings of the 13th IEEE Computer Security Foundations Workshop","author":"A. Perrig","year":"2000","unstructured":"Perrig, A., Song, D.: Looking for diamonds in the desert \u2014 extending automatic protocol generation to three-party authentication and key agreement protocols. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, pp. 64\u201376. IEEE Computer Society, Los Alamitos (2000)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/3-540-44585-4_21","volume-title":"Computer Aided Verification","author":"D. Song","year":"2001","unstructured":"Song, D., Perrig, A., Phan, D.: Agvi\u2013automatic generation, verification, and implementation of security protocols. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol.\u00a02102, pp. 241\u2013245. Springer, Heidelberg (2001)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, H., Foley, S.N.: Fast automatic synthesis of security protocols using backward search. In: ACM Workshop on Formal Methods for Security Engineering, Washington, DC, USA (2003)","DOI":"10.1145\/1035429.1035430"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:36Z","timestamp":1619506596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/11542322_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}