{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:14:14Z","timestamp":1725484454480},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540000297"},{"type":"electronic","value":"9783540361039"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36103-0_40","type":"book-chapter","created":{"date-parts":[[2007,5,16]],"date-time":"2007-05-16T03:15:07Z","timestamp":1179285307000},"page":"396-400","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of a Security Protocol in \u03bcCRL"],"prefix":"10.1007","author":[{"given":"Jun","family":"Pang","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,10,10]]},"reference":[{"key":"40_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1007\/3-540-44585-4_23","volume-title":"Proc. CAV\u20192001","author":"S.C.C. Blom","year":"2001","unstructured":"S.C.C. Blom, W.J. Fokkink, J.F. Groote, I.Z. vanLangevelde, B. Lisser and J.C. van de Pol. \u03bcCRL: A toolset for analysing algebraic specification. In Proc. CAV\u20192001, LNCS 2102, Springer-Verlag, pp. 250\u2013254."},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory 29(2) (1983).","DOI":"10.1109\/TIT.1983.1056650"},{"key":"40_CR3","unstructured":"N. Durgin and J. Mitchell. Analysis of security protocols. In Calculational System Design (1999), ISO Press, pp. 369\u2013395."},{"key":"40_CR4","series-title":"Lect Notes Comput Sci","first-page":"437","volume-title":"Proc. CAV\u20191997","author":"J.-C. Fernandez","year":"1997","unstructured":"J.-C. Fernandez, H. Garavel, A. Kerbrat, L. Mounier, R. Mateescu and M. Sighireanu. CADP-a protocol validation and verification toolbox. In Proc. CAV\u20191997, LNCS 1102, Springer-Verlag, pp. 437\u2013440."},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"W.J. Fokkink. Introduction to Process Algebra. Texts in Theoretical Computer Science. Springer-Verlag, 2000.","DOI":"10.1007\/978-3-662-04293-9"},{"key":"40_CR6","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1016\/S0140-3664(99)00239-X","volume":"23","author":"G. Leduc","year":"2000","unstructured":"G. Leduc and F. Germeau. Verification of security protocols using Lotos-method and application. Computer Communications 23 (2000), 1089\u20131103.","journal-title":"Computer Communications"},{"key":"40_CR7","unstructured":"G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In 2nd International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (1996), Springer-Verlag, pp. 147\u2013166."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"G. Lowe. Some new attacks upon security protocols. In 9th IEEE Computer Security Foundations Workshop (1996), IEEE Press, pp. 162\u2013169.","DOI":"10.1109\/CSFW.1996.503701"},{"key":"40_CR9","unstructured":"R. Mateescu and M. Sighireanu. Efficient on-the-fly model-cheching for regular alternation-free mu-calculus. In Proc. FMICS\u20192000, pp. 65\u201386."},{"key":"40_CR10","unstructured":"J. Mitchell, M. Mitchell and U. Stern. Automated analysis of cryptographic protocols using Mur\u00f8. In Proc. of IEEE Symposium on Security and Privacy (1997), pp. 141\u2013151."},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978), 120\u2013126.","DOI":"10.1145\/359657.359659"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"J. Pang. Analysis of a security protocol in \u03bcCRL. Tech. Rep. SEN-R0201, CWI, Amsterdam, 2002.","DOI":"10.1007\/3-540-36103-0_40"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36103-0_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T00:55:47Z","timestamp":1556412947000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36103-0_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540000297","9783540361039"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36103-0_40","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}