{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:20:37Z","timestamp":1725560437394},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540289555"},{"type":"electronic","value":"9783540319368"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11554578_4","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:51:11Z","timestamp":1127825471000},"page":"109-132","source":"Crossref","is-referenced-by-count":0,"title":["Static Analysis of Authentication"],"prefix":"10.1007","author":[{"given":"Riccardo","family":"Focardi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1016\/S0304-3975(02)00863-0","volume":"298","author":"M. Abadi","year":"2003","unstructured":"Abadi, M., Blanchet, B.: Secrecy types for asymmetric communication. Theor. Comput. Sci.\u00a0298(3), 387\u2013415 (2003)","journal-title":"Theor. Comput. Sci."},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering\u00a022(1), 6\u201315 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Proceedings of Foundations of Software Science and Computation Structures, pp. 136\u2013152 (2003)","DOI":"10.1007\/3-540-36576-1_9"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW 2003), pp. 126\u2013140. IEEE Computer Society Press, Los Alamitos (June 2003)","DOI":"10.1109\/CSFW.2003.1212709"},{"key":"4_CR6","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Control flow analysis can find new flaws too. In: Proceedings of the Workshop on Issues on the Theory of Security (WITS 2004), ENTCS. Elsevier, Amsterdam (2004)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/3-540-48224-5_55","volume-title":"Automata, Languages and Programming","author":"M. Boreale","year":"2001","unstructured":"Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 667\u2013681. Springer, Heidelberg (2001)"},{"key":"4_CR8","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Dynamic types for authentication (full version) (submitted for Publication)"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1007\/978-3-540-39866-0_29","volume-title":"Perspectives of System Informatics","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Principles for entity authentication. In: Broy, M., Zamulin, A.V. (eds.) PSI 2003. LNCS, vol.\u00a02890, pp. 294\u2013307. Springer, Heidelberg (2004)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-540-24725-8_11","volume-title":"Programming Languages and Systems","author":"M. Bugliesi","year":"2004","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Compositional analysis of authentication protocols. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 140\u2013154. Springer, Heidelberg (2004)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Analysis of typed-based analyses of authentication protocols. In: Proceedings of 18th IEEE Computer Security Foundations Workshop (CSFW 2005). IEEE Press, Los Alamitos (2005) (to appear)","DOI":"10.1109\/CSFW.2005.8"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Bugliesi, M., Focardi, R., Maffei, M.: Authenticity by tagging and typing. In: 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2004), pp. 1\u201312. ACM press, New York (October 2004) ISBN 1-58113-971-3","DOI":"10.1145\/1029133.1029135"},{"key":"4_CR13","unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0 (November 1997), http:\/\/www.cs.york.ac.uk\/~jac\/papers\/drareview.ps.gz"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/3-540-45022-X_31","volume-title":"Automata, Languages and Programming","author":"R. Focardi","year":"2000","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Non interference for the analysis of cryptographic protocols. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853, pp. 354\u2013372. Springer, Heidelberg (2000)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Focardi, R., Maffei, M., Placella, F.: Inferring authentication tags. In: Proceedings of IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues on the Theory of Security (WITS 2005). ACM Digital Library, New York (January 2005)","DOI":"10.1145\/1045405.1045410"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Gordon, A., Jeffrey, A.: Authenticity by typing for security protocols. In: Proceedings of 14th IEEE Computer Security Foundations Workshop (CSFW 2001), pp. 145\u2013159. IEEE Computer Society Press, Los Alamitos (June 2001)","DOI":"10.1109\/CSFW.2001.930143"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/CSFW.2002.1021808","volume-title":"Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"A. Gordon","year":"2002","unstructured":"Gordon, A., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: Proceedings of 15th IEEE Computer Security Foundations Workshop (CSFW 2002), June 24-26, pp. 77\u201391. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"3\/4","key":"4_CR18","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2004-123-406","volume":"12","author":"A. Gordon","year":"2004","unstructured":"Gordon, A., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security\u00a012(3\/4), 435\u2013484 (2004)","journal-title":"Journal of Computer Security"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/S0304-3975(01)00139-6","volume":"283","author":"J.D. Guttman","year":"2002","unstructured":"Guttman, J.D., Thayer F\u00e0brega, F.J.: Authentication tests and the structure of bundles. Theoretical Computer Science\u00a0283(2), 333\u2013380 (2002)","journal-title":"Theoretical Computer Science"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-24725-8_23","volume-title":"Programming Languages and Systems","author":"J.D. Guttman","year":"2004","unstructured":"Guttman, J.D., Thayer, F.J., Carlson, J.A., Herzog, J.C., Ramsdell, J.D., Sniffen, B.T.: Trust management in strand spaces: a rely-guarantee method. In: Schmidt, D. (ed.) ESOP 2004. LNCS, vol.\u00a02986, pp. 325\u2013339. Springer, Heidelberg (2004)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Guttman, J.D., Thayer, F.J.: Protocol independence through disjoint encryption. In: Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW 2000), pp. 24\u201334. IEEE Computer Society Press, Los Alamitos (July 2000)","DOI":"10.1109\/CSFW.2000.856923"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW 2000), pp. 255\u2013268. IEEE Computer Society Press, Los Alamitos (July 2000)","DOI":"10.1109\/CSFW.2000.856942"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"4_CR24","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/CSFW.1997.596782","volume-title":"Proceedings of the 10th Computer Security Foundation Workshop (CSFW 1997)","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A Hierarchy of Authentication Specification. In: Proceedings of the 10th Computer Security Foundation Workshop (CSFW 1997), pp. 31\u201344. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"4_CR25","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"4_CR26","first-page":"141","volume-title":"Proceedings of the 1997 IEEE Symposium on Research in Security and Privacy","author":"J.C. Mitchell","year":"1997","unstructured":"Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using mur\u03c6. In: Proceedings of the 1997 IEEE Symposium on Research in Security and Privacy, pp. 141\u2013153. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/24592.24593","volume":"21","author":"R.M. Needham","year":"1987","unstructured":"Needham, R.M., Schroeder, M.D.: Authentication revisited. ACM SIGOPS Operating Systems Review\u00a021(1), 7\u20137 (1987)","journal-title":"ACM SIGOPS Operating Systems Review"},{"issue":"3","key":"4_CR28","doi-asserted-by":"crossref","first-page":"197","DOI":"10.3233\/JCS-2001-9302","volume":"9","author":"L.C. Paulson","year":"2001","unstructured":"Paulson, L.C.: Relations between secrets: Two formal analyses of the yahalom protocol. Journal of Computer Security\u00a09(3), 197\u2013216 (2001)","journal-title":"Journal of Computer Security"},{"key":"4_CR29","volume-title":"Cryptography, Theory and Practice","author":"D.R. Stinson","year":"1995","unstructured":"Stinson, D.R.: Cryptography, Theory and Practice. CRC Press, Boca Raton (1995)"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Thayer, J., Herzog, J., Guttman, J.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(2\/3) (1999)","DOI":"10.3233\/JCS-1999-72-304"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A Semantic Model for Authentication Protocols. In: Proceedings of 1993 IEEE Symposium on Security and Privacy, pp. 178\u2013194 (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11554578_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:46:49Z","timestamp":1605642409000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11554578_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540289555","9783540319368"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11554578_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}