{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:06Z","timestamp":1763467806369,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_16","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"209-223","source":"Crossref","is-referenced-by-count":15,"title":["Exploring Fair Exchange Protocols Using Specification Animation"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]},{"given":"Peter","family":"Kearney","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"16_CR1","unstructured":"N. Asokan, Victor Shoup and Michael Waidner, \u201cAsynchronous Protocols for Optimistic Fair Exchange\u201d, IEEE Symposium on Security and Privacy, 1998, IEEE Computer Society Press, 1998. Corrected version available at http:\/\/www.zurich.ibm.com\/Technology\/Security\/publications\/1998\/ASW98.ps.gz ."},{"issue":"8","key":"16_CR2","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1016\/0167-4048(90)90114-9","volume":"9","author":"H. B\u00fcrk","year":"1991","unstructured":"Holger B\u00fcrk and Andreas Pfitzmann, \u201cValue Exchange Systems Enabling Security and Observability\u201d, Computers and Security, 9, 8, pp.715\u2013721, 1991.","journal-title":"Computers and Security"},{"key":"16_CR3","unstructured":"Josep Llu\u00eds Gomila, Lloren\u00e7 Huguet i Rotger, \u201cAn Efficient Asynchronous Protocol for Optimistic Certified Electronic Mail\u201d, CRYPTEC\u201999 Proceedings, City University of Hong Kong Press, 1999, pp.147\u2013154."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Dan Hazel, Paul Strooper and Owen Traynor, \u201cPossum: An animator for the Sum specification language\u201d, Asia-Pacific Software Engineering Conference and International Computer Science Conference, IEEE Computer Society, 1997, pp.42\u201351.","DOI":"10.1109\/APSEC.1997.640160"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Catherine Meadows,\u201cOpen Issues in Formal Methods for Cryptogra-phic Protocol Analysis\u201d, Proceedings of DISCEX 2000, IEEE Computer Society Press, pp. 237\u2013250, January, 2000. Also available at http:\/\/chacs.nrl.navy.mil\/publications\/CHACS\/2000\/2000meadowsdiscex.ps .","DOI":"10.1109\/DISCEX.2000.824984"},{"key":"16_CR6","unstructured":"B. Potter, J. Sinclair and D. Till, An Introduction to Formal Specification and Z, Prentice Hall, 1991."},{"key":"16_CR7","unstructured":"S. Schneider, Formal Analysis of a Non-Repudiation Protocol, 11th IEEE Computer Security Foundations Workshop, 1998. Also available at http:\/\/www.dcs.rhbnc.ac.uk\/research\/formal\/steve\/papers\/csfw98.ps.gz ."},{"issue":"1","key":"16_CR8","first-page":"513","volume":"17","author":"O. Traynor","year":"1995","unstructured":"Owen Traynor, Peter Kearney, Ed Kazmierczak, Li Wang and Einar Karlsen, \u201cExtending Z with Modules\u201d, Australasian Computer Science Communications, 17, 1, pp.513\u2013522, 1995.","journal-title":"Australasian Computer Science Communications"},{"key":"16_CR9","unstructured":"J. Zhou and D. Gollman, \u201cA Fair Non-Repudiation Protocol\u201d, IEEE Symposium on Security and Privacy, pp.56\u201361, IEEE Computer Society Press, 1996."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"J. Zhou and D. Gollman, \u201cAn Efficient Non-Repudiation Protocol\u201d, IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, pp.126\u2013132, 1997","DOI":"10.1109\/CSFW.1997.596801"},{"key":"16_CR11","unstructured":"J. Zhou and D. Gollmann, \u201cTowards Verification of Non-repudiation Protocols\u201d, Proceedings of 1998 International Refinement Workshop and Formal Methods Pacific, pp. 370\u2013380, Canberra, Australia, September 1998, Springer. Also available at http:\/\/homex.s-one.net.sg\/user\/jyzhou\/IRW98.ps ."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Jianying Zhou, Robert Deng and Feng Bao, \u201cSome Remarks on a Fair Exchange Protocol\u201d, Public Key Cryptography 2000, Springer-Verlag, 2000, pp.46\u201357.","DOI":"10.1007\/978-3-540-46588-1_4"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:07:27Z","timestamp":1737396447000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}