{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T04:59:54Z","timestamp":1777957194376,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540300076","type":"print"},{"value":"9783540314837","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11580850_10","type":"book-chapter","created":{"date-parts":[[2005,12,6]],"date-time":"2005-12-06T05:50:36Z","timestamp":1133848236000},"page":"163-181","source":"Crossref","is-referenced-by-count":7,"title":["A Formal Semantics for Protocol Narrations"],"prefix":"10.1007","author":[{"given":"S\u00e9bastien","family":"Briais","sequence":"first","affiliation":[]},{"given":"Uwe","family":"Nestmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"39","volume-title":"Foundations of Secure Computation","author":"M. Abadi","year":"2000","unstructured":"Abadi, M.: Security Protocols and their Properties. In: Foundations of Secure Computation, pp. 39\u201360. NATO ASI. IOS Press, Amsterdam (2000)"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.: Automatic validation of protocol narration. In: Proceedings of 16th IEEE Computer Security Foundations Workshop (CSFW 16), pp. 126\u2013140 (2003)","DOI":"10.1109\/CSFW.2003.1212709"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-28644-8_11","volume-title":"CONCUR 2004 - Concurrency Theory","author":"J. Borgstr\u00f6m","year":"2004","unstructured":"Borgstr\u00f6m, J., Briais, S., Nestmann, U.: Symbolic Bisimulation in the Spi Calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol.\u00a03170, pp. 161\u2013176. Springer, Heidelberg (2004)"},{"key":"10_CR5","volume-title":"Proceedings of Principles and Practice of Declarative Programming (PPDP 2003)","author":"B. Blanchet","year":"2003","unstructured":"Blanchet, B.: Automatic Verification of Cryptographic Protocols: A Logic Programming Approach. In: Proceedings of Principles and Practice of Declarative Programming (PPDP 2003). ACM, New York (2003)"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-39650-5_15","volume-title":"Computer Security \u2013 ESORICS 2003","author":"D. Basin","year":"2003","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: An On-the-Fly Model-Checker for Security Protocol Analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 253\u2013270. Springer, Heidelberg (2003)"},{"key":"10_CR7","unstructured":"Briais, S.: Formal proofs about hedges using the Coq proof assistant (2004), \n                  \n                    http:\/\/lamp.epfl.ch\/~sbriais\/spi\/hedges\/hedge.html"},{"key":"10_CR8","unstructured":"Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature. Technical Report 1.0, University of York (1997)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/11495628_4","volume-title":"Scenarios: Models, Transformations and Tools","author":"C.J.F. Cremers","year":"2005","unstructured":"Cremers, C., Mauw, S.: Operational Semantics of Security Protocols. In: Leue, S., Syst\u00e4, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol.\u00a03466, pp. 66\u201389. Springer, Heidelberg (2005)"},{"issue":"12","key":"10_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a0IT-29(12), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR11","unstructured":"Gensoul, C.: Spyer \u2014 un compilateur de protocoles cryptographiques. Semester Project Report, EPFL (July 2003)"},{"key":"10_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44404-1_10","volume-title":"Logic for Programming and Automated Reasoning","author":"F. Jacquemard","year":"2000","unstructured":"Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and Verifying Security Protocols. In: Parigot, M., Voronkov, A. (eds.) LPAR 2000. LNCS (LNAI), vol.\u00a01955, pp. 131\u2013160. Springer, Heidelberg (2000)"},{"key":"10_CR13","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security\u00a06, 53\u201384 (1998)","journal-title":"Journal of Computer Security"},{"key":"10_CR14","unstructured":"Millen, J.K.: CAPSL: Common Authentication Protocol Specification Language, \n                  \n                    http:\/\/www.csl.sri.com\/users\/millen\/capsl\/"},{"key":"10_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"issue":"1-2","key":"10_CR16","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"10_CR17","unstructured":"Sumii, E., Tatsuzawa, H., Yonezawa, A.: Translating Security Protocols from Informal Notation into Spi Calculus. IPSJ Transactions on Programming\u00a045 Written in Japanese, abstract in English (2005) (to appear)"}],"container-title":["Lecture Notes in Computer Science","Trustworthy Global Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11580850_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T03:44:02Z","timestamp":1553226242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11580850_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540300076","9783540314837"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11580850_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}