{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:33:32Z","timestamp":1725471212965},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457626"},{"type":"electronic","value":"9783540457633"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11875567_4","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:25:27Z","timestamp":1158931527000},"page":"42-56","source":"Crossref","is-referenced-by-count":4,"title":["Verifying a Chipcard-Based Biometric Identification Protocol in VSE"],"prefix":"10.1007","author":[{"given":"Lassaad","family":"Cheikhrouhou","sequence":"first","affiliation":[]},{"given":"Georg","family":"Rock","sequence":"additional","affiliation":[]},{"given":"Werner","family":"Stephan","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Schwan","sequence":"additional","affiliation":[]},{"given":"Gunter","family":"Lassmann","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transactions on Information Theory 2(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"4_CR3","unstructured":"The Verisoft Project, http:\/\/www.verisoft.de\/"},{"key":"4_CR4","unstructured":"Lassmann, G., Schwan, M.: Vertrauensw\u00fcdige Chipkartenbasierte Biometrische Authentifikation. In: Dittmann, J (Hrsg.) (ed.) Sicherheit 2006, Sicherheit-Schutz und Zuverl\u00e4ssigkeit. GI-Edition Lectures Notes in Informatics, Gesellschaft f\u00fcr Informatik, Bonn (2006)"},{"key":"4_CR5","volume-title":"Modeling and Analysis of Security Protocols","author":"P. Ryan","year":"2000","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modeling and Analysis of Security Protocols. Addison Wesley, Reading (2000)"},{"key":"4_CR6","unstructured":"Denker, G., Millen, J., Rue\u00df, H.: The CAPSL Integrated Protocol Environment protocol. SRI Technical Report SRI-CSL-2000-02 (October 2000)"},{"issue":"2","key":"4_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL Protocol Analyzer: An overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security\u00a06, 53\u201384 (1998)","journal-title":"Journal of Computer Security"},{"key":"4_CR9","first-page":"93","volume":"17","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software\u2014Concepts and Tools\u00a017, 93\u2013102 (1996)","journal-title":"Software\u2014Concepts and Tools"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Durante, A., Focardi, R., Gorrieri, R.: Cvs: A compiler for the analysis of cryptographic protocols. In: Proceedings of 12th IEEE Computer Security Foundations Workshop, pp. 203\u2013212 (1999)","DOI":"10.1109\/CSFW.1999.779774"},{"key":"4_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-48660-7_34","volume-title":"Automated Deduction - CADE-16","author":"C. Weidenbach","year":"1999","unstructured":"Weidenbach, C.: Towards an automatic analysis of security protocols. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol.\u00a01632, pp. 378\u2013382. Springer, Heidelberg (1999)"},{"issue":"10","key":"4_CR12","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/32.637148","volume":"23","author":"G. Lowe","year":"1997","unstructured":"Lowe, G., Roscoe, A.W.: Using CSP to detect errors in the TMN protocol. IEEE Transactions on Software Engineering\u00a023(10), 659\u2013669 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Marrero, W., Clarke, E., Jha, S.: A model checker for authentication protocols. In: Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols (1997)","DOI":"10.21236\/ADA327281"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/155848.155852","volume":"27","author":"B.C. Neuman","year":"1993","unstructured":"Neuman, B.C., Stubblebine, S.G.: A note on the use of timestamps as nonces. ACM SIGOPS, Operating Systems Review\u00a027(2), 10\u201314 (1993)","journal-title":"ACM SIGOPS, Operating Systems Review"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using Mur\u03c6. In: IEEE Symposium on Security and Privacy (1997)","DOI":"10.1109\/SECPRI.1997.601329"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/3-540-46701-7_3","volume-title":"Secure Networking - CQRE (Secure) \u201999","author":"D. Basin","year":"1999","unstructured":"Basin, D.: Lazy Infinite-State Analysis of Security Protocols. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol.\u00a01740, pp. 30\u201342. Springer, Heidelberg (1999)"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-39650-5_15","volume-title":"Computer Security \u2013 ESORICS 2003","author":"D. Basin","year":"2003","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: An On-The-Fly Model-Checker for Security Protocol Analysis. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 253\u2013270. Springer, Heidelberg (2003)"},{"issue":"2,3","key":"4_CR18","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F.J. Thayer F\u00e1brega","year":"1999","unstructured":"Thayer F\u00e1brega, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(2,3), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security (1997)","DOI":"10.1145\/266420.266432"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"667","DOI":"10.1007\/3-540-48224-5_55","volume-title":"Types in Compilation","author":"M. Boreale","year":"2001","unstructured":"Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Harper, R. (ed.) TIC 2000. LNCS, vol.\u00a02071, pp. 667\u2013681. Springer, Heidelberg (2001)"},{"key":"4_CR21","unstructured":"Donovan, R., Norris, M., Lowe, G.: Analyzing a library of security protocols using Casper and FDR. In: Proceedings of the FLoC Workshop on Formal Methods and Security Protocols (Trento, Italy) (1999)"},{"issue":"1,2","key":"4_CR22","doi-asserted-by":"crossref","first-page":"47","DOI":"10.3233\/JCS-2001-91-203","volume":"9","author":"D.X. Song","year":"2001","unstructured":"Song, D.X., Berezin, S., Perrig, A.: Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security\u00a09(1,2), 47\u201374 (2001)","journal-title":"Journal of Computer Security"},{"key":"4_CR23","volume-title":"Proceedings Formal Methods Europe 1996: Industrial Benefits and Advances in Formal Methods","author":"D. Hutter","year":"1996","unstructured":"Hutter, D., Langenstein, B., Sengler, C., Siekmann, J.H., Stephan, W., Wolpers, A.: Deduction in the Verification Support Environment (VSE). In: Gaudel, M.-C., Woodcock, J. (eds.) Proceedings Formal Methods Europe 1996: Industrial Benefits and Advances in Formal Methods. Springer, Heidelberg (1996)"},{"issue":"6","key":"4_CR24","first-page":"523","volume":"1","author":"D. Hutter","year":"1996","unstructured":"Hutter, D., Langenstein, B., Sengler, C., Siekmann, J.H., Stephan, W., Wolpers, A.: Verification support environment (vse). High Integrity Systems\u00a01(6), 523\u2013530 (1996)","journal-title":"High Integrity Systems"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48257-1","volume-title":"Applied Formal Methods - FM-Trends 98","author":"D. Hutter","year":"1999","unstructured":"Hutter, D., Mantel, H., Rock, G., Stephan, W., Wolpers, A., Balser, M., Reif, W., Schellhorn, G., Stenzel, K.: VSE: Controlling the complexity in formal software developments. In: Hutter, D., Traverso, P. (eds.) FM-Trends 1998. LNCS, vol.\u00a01641. Springer, Heidelberg (1999)"},{"key":"4_CR26","first-page":"367","volume-title":"FLAIRS 2000: Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference","author":"D. Hutter","year":"2000","unstructured":"Hutter, D., Rock, G., Siekmann, J.H., Stephan, W., Vogt, R.: Formal Software Development in the Verification Support Environment (VSE). In: Manaris, B., Etheredge, J. (eds.) FLAIRS 2000: Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, pp. 367\u2013376. AAAI Press, Menlo Park (2000)"},{"key":"4_CR27","series-title":"Advances in Computing Science","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/978-3-7091-6355-9_16","volume-title":"Tool Support for System Specification, Development and Verification","author":"G. Rock","year":"1999","unstructured":"Rock, G., Stephan, W., Wolpers, A.: Modular Reasoning about Structured TLA Specifications. In: Berghammer, R., Lakhnech, Y. (eds.) Tool Support for System Specification, Development and Verification. Advances in Computing Science, pp. 217\u2013229. Springer, Wien (1999)"},{"key":"4_CR28","first-page":"125","volume-title":"FBT 1998. Formale Beschreibungstechniken f\u00fcr verteilte Systeme","author":"G. Rock","year":"1998","unstructured":"Rock, G., Stephan, W., Wolpers, A.: Assumption\u2013Commitment Specifications and Safety-Critical Systems. In: K\u00f6nig, H., Langend\u00f6rfer, P. (eds.) FBT 1998. Formale Beschreibungstechniken f\u00fcr verteilte Systeme, 8, GI\/ITG-Fachgespr\u00e4ch, pp. 125\u2013135. Shaker Verlag, Aachen (1998)"},{"key":"4_CR29","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-540-32254-2_27","volume-title":"Mechanizing Mathematical Reasoning","author":"W. Stephan","year":"2005","unstructured":"Stephan, W., Langenstein, B., Nonnengart, A., Rock, G.: Verification Support Environment. In: Hutter, D., Stephan, W. (eds.) Mechanizing Mathematical Reasoning. LNCS (LNAI), vol.\u00a02605, pp. 476\u2013493. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11875567_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:47:57Z","timestamp":1605642477000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11875567_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457626","9783540457633"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/11875567_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}