{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:56:11Z","timestamp":1725483371467},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442639"},{"type":"electronic","value":"9783540458074"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45807-7_19","type":"book-chapter","created":{"date-parts":[[2007,5,4]],"date-time":"2007-05-04T00:46:46Z","timestamp":1178239606000},"page":"119-125","source":"Crossref","is-referenced-by-count":1,"title":["A Proof of Non-repudiation"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Lawrence C.","family":"Paulson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"unstructured":"G. Bella. Message Reception in the Inductive Approach. Research Report 460, University of Cambridge \u2014 Computer Laboratory, 1999.","key":"19_CR1"},{"key":"19_CR2","series-title":"Lect Notes Comput Sci","first-page":"85","volume-title":"Proc. of the 7th International Workshop on Security Protocols","author":"G. Bella","year":"1999","unstructured":"G. Bella. Modelling Agents\u2019 Knowledge Inductively. In B. Christianson, B. Crispo, J. A. Malcolm, and R. Michae, editors, Proc. of the 7th International Workshop on Security Protocols, LNCS 1796, pages 85\u201394. Springer-Verlag, 1999."},{"key":"19_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Proc. of the 5th European Symposium on Research in Computer Security (ESORICS\u201998)","author":"G. Bella","year":"1998","unstructured":"G. Bella and L. C. Paulson. Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proc. of the 5th European Symposium on Research in Computer Security (ESORICS\u201998), LNCS 1485, pages 361\u2013375. Springer-Verlag, 1998."},{"key":"19_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/BFb0028763","volume-title":"Proc. of the International Conference on Computer-Aided Verification (CAV\u201998)","author":"G. Bella","year":"1998","unstructured":"G. Bella and L. C. Paulson. Mechanising BAN Kerberos by the Inductive Method. In A. J. Hu and M. Y. Vardi, editors, Proc. of the International Conference on Computer-Aided Verification (CAV\u201998), LNCS 1427, pages 416\u2013427. Springer-Verlag, 1998."},{"issue":"1","key":"19_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/18.50372","volume":"36","author":"M. Ben-Or","year":"1990","unstructured":"M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest. A Fair Protocol for Signing Contracts. IEEE Transactions on Information Theory, 36(1):40\u201346, 1990.","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"T. Okamoto and K. Ohta. How to Simultaneously Exchange Secrets by General Assumptions. In Proc. of the 2nd ACM Conference on Computer and Communication Security (CCS\u201994), pages 184\u2013192, 1994.","key":"19_CR6","DOI":"10.1145\/191177.191221"},{"key":"19_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030541","volume-title":"Isabelle: A Generic Theorem Prover","author":"L. C. Paulson","year":"1994","unstructured":"L. C. Paulson. Isabelle: A Generic Theorem Prover. LNCS 828. Springer-Verlag, 1994."},{"unstructured":"L. C. Paulson. Theory for public-key protocols, 1996. \n                  http:\/\/www4.informatik.tu-muenchen.de\/~isabelle\/library\/ HOL\/Auth\/Public.html\n                  \n                .","key":"19_CR8"},{"key":"19_CR9","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. C. Paulson","year":"1998","unstructured":"L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85\u2013128, 1998.","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"S. Schneider. Formal Analysis of a Non-Repudiation Protocol. In Proc. of the 11th IEEE Computer Security Foundations Workshop. IEEE Press, 1998.","key":"19_CR10","DOI":"10.1109\/CSFW.1998.683155"},{"unstructured":"G. Zhou and D. Gollmann. Towards Verification of Non-Repudiation Protocols. In Proc. of the 1998 International Refinement Workshop and Formal Methods Pacific, pages 370\u2013380. Springer-Verlag, 1998.","key":"19_CR11"},{"unstructured":"J. Zhou and D. Gollmann. A Fair Non-Repudiation Protocol. In Proc. of the 15th IEEE Symposium on Security and Privacy, pages 55\u201361. IEEE Press, 1996.","key":"19_CR12"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45807-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T13:08:53Z","timestamp":1550322533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45807-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442639","9783540458074"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-45807-7_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}