{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:30:12Z","timestamp":1725485412229},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443094"},{"type":"electronic","value":"9783540458319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45831-x_17","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T23:19:06Z","timestamp":1180826346000},"page":"246-259","source":"Crossref","is-referenced-by-count":2,"title":["Protocol Engineering Applied to Formal Analysis of Security Systems"],"prefix":"10.1007","author":[{"given":"Javier","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Juan J.","family":"Ortega","sequence":"additional","affiliation":[]},{"given":"Jose M.","family":"Troya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"17_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1007\/BFb0028774","volume-title":"CAV 98: Computer-aided Verification","author":"R. Alur","year":"1998","unstructured":"R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. Mocha: modularity in model checking. CAV 98: Computer-aided Verification, Lecture Notes in Computer Science 1427, pages 521\u2013525. Springer-Verlag, 1998"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham. A logic of authentication. In Proceedings of the Royal Society, Series A, 426(1871):233\u2013271, 1989","DOI":"10.1145\/74850.74852"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"S.M. Bellovin and M. Merrit. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of IEEE Symposium on Reseach in Security and Privacy, pages 72\u201384, 1992","DOI":"10.1109\/RISP.1992.213269"},{"key":"17_CR4","unstructured":"G. Denker and J. Millen. CAPSL intermediate language. In Formal Methods and Security Protocols,1999. FLOC\u2019 99 Workshop"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"IT-29","author":"D. Dolev","year":"1983","unstructured":"D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29:198\u2013208, 1983","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"17_CR6","doi-asserted-by":"publisher","first-page":"1659","DOI":"10.1016\/0169-7552(95)00124-7","volume":"28","author":"D. Hogrefe","year":"1996","unstructured":"D. Hogrefe. Validation of SDL systems. Computer Networks and ISDN Systems, 28(12):1659\u20131667, June 1996","journal-title":"Computer Networks and ISDN Systems"},{"key":"17_CR7","unstructured":"ITU-T, Geneva, Switzerland. Message Sequence Charts, 1999. ITU-T Recommendation Z.120"},{"key":"17_CR8","unstructured":"ITU-T, Geneva, Switzerland. Specification and Description Language (SDL), 1999. ITU-T Recommendation Z.100"},{"key":"17_CR9","volume-title":"Design and Validation of Computer Protocols","author":"G. Holzmann","year":"1991","unstructured":"G. Holzmann. Design and Validation of Computer Protocols. Prentice-Hall, Englewood Cliffs, 1991"},{"key":"17_CR10","unstructured":"J. Lopez,, J.J. Ortega; J. M. Troya. Verification of authentication protocols using SDLMethod. First International Workshop on Security in Information Systems (SIS 2002), April 2002, pp. 61\u201371"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"G. Lowe. Towards a Completeness Result for Model Checking of Security Protocols. 11th IEEE Computer Security Foundations Workshop, pages 96\u2013105. IEEE Computer Society, 1998","DOI":"10.1109\/CSFW.1998.683159"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"W. Marrero, E. Clarke, and S. Jha. Model checking for security protocols. DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997","DOI":"10.21236\/ADA327281"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"C. Meadows. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2000, pages 237\u2013250. IEEE Comp. Society Press, 2000.","DOI":"10.21236\/ADA385327"},{"key":"17_CR14","unstructured":"J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using Murphi. In Proceedings of IEEE Symposium on Security and Privacy, pages 141\u2013151. IEEE Computer Society Press, 1997."},{"key":"17_CR15","unstructured":"M. Rusinowich, M. Turuani. Protocol Insecurity with Finite Number of Sessions is NPcomplete. 14th IEEE Computer Security Foundations Workshop June 11\u201313, 2001"},{"key":"17_CR16","unstructured":"P. Ryan and Scheneider. The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001"},{"key":"17_CR17","unstructured":"A. Sarma J. Ellsberger, D. Hogrefe. SDL-Formal object-oriented language for communication systems. Prentice-Hall, 1997."}],"container-title":["Lecture Notes in Computer Science","Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45831-X_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T16:30:37Z","timestamp":1556469037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45831-X_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443094","9783540458319"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45831-x_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}