{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:01:54Z","timestamp":1725544914170},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540326281"},{"type":"electronic","value":"9783540326298"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11679219_13","type":"book-chapter","created":{"date-parts":[[2006,2,23]],"date-time":"2006-02-23T07:36:41Z","timestamp":1140680201000},"page":"171-186","source":"Crossref","is-referenced-by-count":2,"title":["Secure Untrusted Binaries \u2014 Provably!"],"prefix":"10.1007","author":[{"given":"Simon","family":"Winwood","sequence":"first","affiliation":[]},{"given":"Manuel M. T.","family":"Chakravarty","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021, 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"13_CR2","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1145\/335169.335198","volume-title":"Proceedings of the 1999 ACM New Security Paradigms Workshop","author":"S. Pancho","year":"1999","unstructured":"Pancho, S.: Paradigm shifts in protocol analysis. In: Proceedings of the 1999 ACM New Security Paradigms Workshop, pp. 70\u201379. ACM Press, New York (1999)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 55\u201361 (1996)","DOI":"10.1109\/SECPRI.1996.502669"},{"key":"13_CR5","unstructured":"Zhou, J., Gollmann, D.: Towards verification of non-repudiation protocols. In: Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, Canberra, Australia, pp. 370\u2013380 (1998)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Schneider, S.: Formal analysis of a non-repudiation protocol. In: Proceedings of the 11th IEEE Computer Security Foundations Workshop (1998)","DOI":"10.1109\/CSFW.1998.683155"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-44755-5_8","volume-title":"Theorem Proving in Higher Order Logics","author":"G. Bella","year":"2001","unstructured":"Bella, G., Paulson, L.C.: Mechanical proofs about a non-repudiation protocol. In: Boulton, R.J., Jackson, P.B. (eds.) TPHOLs 2001. LNCS, vol.\u00a02152, pp. 91\u2013104. Springer, Heidelberg (2001)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"G\u00fcrgens, S., Rudolph, C.: Security analysis of (un-)fair non-repudiation protocols. In: Proceedings of the Conference on Formal Aspects of Security (2002)","DOI":"10.1007\/978-3-540-40981-6_10"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., van Oorschot, P.C.: On unifying some cryptographic protocol logics. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 14\u201328 (1994)","DOI":"10.21236\/ADA465512"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-48970-3_21","volume-title":"Information Security and Privacy","author":"J. Zhou","year":"1999","unstructured":"Zhou, J., Deng, R., Bao, F.: Evolution of fair non-repudiation with TTP. In: Pieprzyk, J.P., Safavi-Naini, R., Seberry, J. (eds.) ACISP 1999. LNCS, vol.\u00a01587, p. 258. Springer, Heidelberg (1999)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11679219_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,6]],"date-time":"2023-05-06T15:44:26Z","timestamp":1683387866000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11679219_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540326281","9783540326298"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11679219_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}