{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:08:50Z","timestamp":1725487730542},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426622"},{"type":"electronic","value":"9783540454397"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45439-x_4","type":"book-chapter","created":{"date-parts":[[2007,7,21]],"date-time":"2007-07-21T17:44:53Z","timestamp":1185039893000},"page":"46-62","source":"Crossref","is-referenced-by-count":1,"title":["Suitability of a Classical Analysis Method for E-commerce Protocols"],"prefix":"10.1007","author":[{"given":"Sigrid","family":"G\u00fcrgens","sequence":"first","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"4_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Kerberos version iv: Inductive analysis of the secrecy goals","author":"G. Bella","year":"1998","unstructured":"G. Bella and L.C. Paulson. Kerberos version iv: Inductive analysis of the secrecy goals. In 5th European Symposium on Research in Computer Security, Lecture Notes in Computer Science, pages 361\u2013375. Springer-Verlag, 1998."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In Annual Symposium on the Theory of Computing. ACM, 1998.","DOI":"10.1145\/276698.276854"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"M. Bellare and P. Rogaway. Provably secure session key distribution-the three party case. In Annual Symposium on the Theory of Computing, pages 57\u201366. ACM, 1995.","DOI":"10.1145\/225058.225084"},{"key":"4_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/3-540-15983-5","volume-title":"A framework for the study of cryptographic protocols","author":"R. Berger","year":"1985","unstructured":"R. Berger, S. Kannan, and R. Peralta. A framework for the study of cryptographic protocols. In Advances in Cryptology-CRYPTO \u201995, Lecture Notes in Computer Science, pages 87\u2013103. Springer-Verlag, 1985."},{"key":"4_CR5","unstructured":"S. Brackin. Automatically detecting authentication limitations in commercial security protocols. In Proc. of the 22nd National Conference on Information Systems Security, October 1999."},{"key":"4_CR6","series-title":"Report","volume-title":"A Logic of Authentication","author":"M. Burrows","year":"1989","unstructured":"M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Report 39, Digital Systems Research Center, Palo Alto, California, Feb 1989."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1982","unstructured":"D. Denning and G. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24:533\u2013536, 1982.","journal-title":"Communications of the ACM"},{"key":"4_CR8","unstructured":"DIN NI-17.4. Spezifikation der Schnittstelle zu Chipkarten mit Digitaler Signatur-Anwendung \/ Funktion nach SigG und SigV, Version 1.0 (Draft), November 1998."},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 29:198\u2013208, 1983.","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR10","unstructured":"S. G\u00fcrgens and R. Peralta. Efficient Automated Testing of Cryptographic Protocols. Technical report, GMD German National Research Center for Information Technology, 1998."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"N. Heintze and J.D. Tygar. A Model for Secure Protocols and their Compositions. In 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pages 2\u201313. IEEE Computer Society Press, May 1994.","DOI":"10.1109\/RISP.1994.296596"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/32.502224","volume":"22","author":"R. Kailar","year":"1996","unstructured":"R. Kailar. Accountability in Electronic Commerce Protocols. In IEEE Transactions on Software Engineering, volume 22, pages 313\u2013328. IEEE, 1996.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Second International Workshop, TACAS \u201996","author":"G. Lowe","year":"1996","unstructured":"G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Second International Workshop, TACAS \u201996, volume 1055 of LNCS, pages 147\u2013166. SV, 1996."},{"key":"4_CR14","unstructured":"W. Marrero, E. M. Clarke, and S. Jha. A Model Checker for Authentication Protocols. In DIMACS Workshop on Cryptographic Protocol Design and Verification, http:\/\/dimacs.rutgers.edu\/Workshops\/Security\/ , 1997."},{"key":"4_CR15","first-page":"182","volume-title":"IEEE Symposium on Security and Privacy","author":"C. Meadows","year":"1991","unstructured":"C. Meadows. A system for the specification and verification of key management protocols. In IEEE Symposium on Security and Privacy, pages 182\u2013195. IEEE Computer Society Press, New York, 1991."},{"key":"4_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0000430","volume-title":"Advances in Cryptology-Asiacrypt \u201994","author":"C. Meadows","year":"1995","unstructured":"C. Meadows. Formal Verification of Cryptographic Protocols: A Survey. In Advances in Cryptology-Asiacrypt \u201994, volume 917 of LNCS, pages 133\u2013150. SV, 1995."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"C. Meadows. Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches. In Proceedings of ESORICS, Naval Research Laboratory, 1996. Springer.","DOI":"10.21236\/ADA465136"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"C. Meadows and P. Syverson. A formal specification of requirements for payment transactions in the SET protocol. In Proceedings of Financial Cryptography, 1998.","DOI":"10.1007\/BFb0055477"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, pages 993\u2013999, 1978.","DOI":"10.1145\/359657.359659"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and M. Yung. How to withstand mobile virus attacks. In Proceedings of PODC, pages 51\u201359, 1991.","DOI":"10.1145\/112600.112605"},{"key":"4_CR21","unstructured":"K. O\u2019Toole. The Internet Billing Server-Transaction Protocol Alternatives. Technical Report INI TR 1994-1, Carnegie Mellon University, Information Networking Institute, 1994."},{"key":"4_CR22","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. C. Paulson","year":"1998","unstructured":"L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85\u2013128, 1998.","journal-title":"Journal of Computer Security"},{"issue":"3","key":"4_CR23","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"L. C. Paulson","year":"1999","unstructured":"L. C. Paulson. Inductive Analysis of the Internet Protocol TLS. ACM Trans. on Information and System Security, 2(3):332\u2013351, 1999.","journal-title":"ACM Trans. on Information and System Security"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. L. Rivest","year":"1978","unstructured":"R. L. Rivest, A. Shamir, and L. A. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120\u2013126, 1978.","journal-title":"Communications of the ACM"},{"key":"4_CR25","unstructured":"B. Roscoe, P. Ryan, S. Schneider, M. Goldsmith, and G. Lowe. The modelling and Analysis of Security Protocols. Addison Wesley, 2000."},{"key":"4_CR26","series-title":"Lect Notes Comput Sci","volume-title":"Information Security and Privacy (ACISP 98)","author":"C. Rudolph","year":"1998","unstructured":"C. Rudolph. A Formal Model for Systematic Design of Key Establishment Protocols. In Information Security and Privacy (ACISP 98), Lecture Notes in Computer Science. Springer Verlag, 1998."},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"S. Schneider. Verifying authentication protocols with CSP. In IEEE Computer Security Foundations Workshop. IEEE, 1997.","DOI":"10.1109\/CSFW.1997.596775"},{"key":"4_CR28","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/3-540-68339-9_28","volume-title":"Advances in Cryptology-EUROCRYPT \u201996","author":"V. Shoup","year":"1996","unstructured":"V. Shoup and A. Rubin. Session key distribution using smart card. In Advances in Cryptology-EUROCRYPT \u201996, volume 1070 of LNCS, pages 321\u2013331. SV, 1996."},{"key":"4_CR29","series-title":"Lect Notes Comput Sci","first-page":"324","volume-title":"Advances in Cryptology-CRYPTO \u201989","author":"M. Tatebayashi","year":"1991","unstructured":"M. Tatebayashi, N. Matsuzaki, and D. Newman. Key Distribution Protocol for Digital Mobile Communication Systems. In G. Brassard, editor, Advances in Cryptology-CRYPTO \u201989, volume 435 of LNCS, pages 324\u2013333. SV, 1991."},{"key":"4_CR30","unstructured":"L. Wos, R. Overbeek, E. Lusk, and J. Boyle. Automated Reasoning-Introduction and Applications. McGraw-Hill, Inc., 1992."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45439-X_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T11:33:16Z","timestamp":1556710396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45439-X_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426622","9783540454397"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/3-540-45439-x_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}