{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:55:46Z","timestamp":1725551746051},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540297970"},{"type":"electronic","value":"9783540322504"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576280_10","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T14:01:26Z","timestamp":1130162486000},"page":"125-140","source":"Crossref","is-referenced-by-count":1,"title":["Game Semantics Model for Security Protocols"],"prefix":"10.1007","author":[{"given":"Mourad","family":"Debbabi","sequence":"first","affiliation":[]},{"given":"Mohamed","family":"Saleh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1007\/BFb0014571","volume-title":"Theoretical Aspects of Computer Software","author":"M. Abadi","year":"1997","unstructured":"Abadi, M.: Secrecy by typing in security protocols. In: Ito, T., Abadi, M. (eds.) TACS 1997. LNCS, vol.\u00a01281, pp. 611\u2013638. Springer, Heidelberg (1997)"},{"key":"10_CR2","first-page":"39","volume-title":"Foundations of Secure Computation","author":"M. Abadi","year":"2000","unstructured":"Abadi, M.: Security protocols and their properties. In: Bauer, F.L., Steinbrueggen, R. (eds.) Foundations of Secure Computation, 20th Int. Summer School, Marktoberdorf, Germany, pp. 39\u201360. IOS Press, Amsterdam (2000)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.B.: A calculus for cryptographic protocols: The SPI calculus. In: Proceedings of the 4th ACM Conference on Computer and Communications Security (1997)","DOI":"10.1145\/266420.266432"},{"key":"10_CR4","volume-title":"Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute","author":"S. Abramsky","year":"1997","unstructured":"Abramsky, S.: Semantics of interaction: An introduction to game semantics. In: Dybjer, P., Pitts, A. (eds.) Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute. Cambridge University Press, Cambridge (1997)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Abramsky, S., Malacaria, P., Jagadeesan, R.: Full abstraction for PCF. In: Theoretical Aspects of Computer Software, pp. 1\u201315 (1994)","DOI":"10.1007\/3-540-57887-0_87"},{"key":"10_CR6","unstructured":"Adi, K.: Formal Specification and Analysis of Security Protocols. PhD thesis, Universite Laval (2002)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0168-0072(92)90073-9","volume":"56","author":"A. Blass","year":"1992","unstructured":"Blass, A.: A game semantics for linear logic. Annals of Pure and Applied Logic\u00a056, 183\u2013220 (1992)","journal-title":"Annals of Pure and Applied Logic"},{"key":"10_CR8","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authntication. Technical report, Digital Systems Research Center"},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE transactions on information theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE transactions on information theory"},{"key":"10_CR10","unstructured":"Farmer, W.M.: A basic extended simple type theory. Technical report, McMaster University (2001)"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1006\/inco.2000.2917","volume":"163","author":"J.M.E. Hyland","year":"2000","unstructured":"Hyland, J.M.E., Ong, C.-H.L.: On full abstraction for PCF: I, II, III. Info. and Comp.\u00a0163, 285\u2013408 (2000)","journal-title":"Info. and Comp."},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-540-31856-9_13","volume-title":"STACS 2005","author":"D. Kahler","year":"2005","unstructured":"Kahler, D., Kusters, R., Wilke, T.: Deciding properties of contract signing protocols. In: Diekert, V., Durand, B. (eds.) STACS 2005. LNCS, vol.\u00a03404, pp. 158\u2013169. Springer, Heidelberg (2005)"},{"key":"10_CR13","unstructured":"Kremer, S., Raskin, J.: A game approach to the verification of exchange protocols - application to non-repudiation protocols. In: Proceedings of the Workshop on Issues in the Theory of Security, WITS 2000 (2000)"},{"key":"10_CR14","volume-title":"Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"S. Kremer","year":"2002","unstructured":"Kremer, S., Raskin, J.: Game analysis of abuse-free contract signing. In: Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW 2002). IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"10_CR15","unstructured":"Lorenz, K.: Basic objectives of dialogue logic in historical perspective. Synthese (Elsevier)\u00a0127(1-2) (April\/May 2001)"},{"issue":"1","key":"10_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communication\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12) (1978)","DOI":"10.1145\/359657.359659"},{"key":"10_CR18","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a0(6), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"10_CR19","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"J. Thayer","year":"1999","unstructured":"Thayer, J., Herzog, J., Guttman, J.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a0(7), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. Operating Systems Review, 24\u201337 (1994)","DOI":"10.1145\/182110.182113"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576280_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:30Z","timestamp":1605643170000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576280_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297970","9783540322504"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11576280_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}