{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:31:57Z","timestamp":1725489117095},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_2","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:03:27Z","timestamp":1186844607000},"page":"24-43","source":"Crossref","is-referenced-by-count":6,"title":["Deriving the Complete Knowledge of Participants in Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Marie-Jeanne","family":"Toussaint","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital \u2014 Systems Research Center (SRC), 1989.","DOI":"10.1145\/74850.74852"},{"key":"2_CR2","unstructured":"P. Bieber. Aspects Epist\u00e9miques des Protocoles Cryptographiques. PhD thesis, Universit\u00e9 Paul-Sabatier de Toulouse (Sciences), October 1989."},{"issue":"4","key":"2_CR3","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M. Blum","year":"1984","unstructured":"M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM Journal on Computing, 13(4):850\u2013864, 1984.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR4","volume-title":"The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols","author":"I. B. Damgard","year":"1987","unstructured":"I. B. Damgard. The Application of Claw Free Functions in Cryptography; Unconditional Protection in Cryptographic Protocols. PhD thesis, Mathematical Institute, Aarhus University (Denmark), 1987."},{"key":"2_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/3-540-39799-X_7","volume-title":"Advances in Cryptology \u2014 CRYPTO\u201985, #218","author":"S. Even","year":"1986","unstructured":"S. Even, O. Goldreich, and A. Shamir. On the Security of Ping-Pong Protocols using the RSA. In H. C. Williams, editor, Lecture Notes in Computer Science. Advances in Cryptology \u2014 CRYPTO\u201985, #218, pages 58\u201372. Springer-Verlag, 1986."},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"S. Goldwasser, S. Micali, and C. Rackoff. The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1):186\u2013208, 1989.","journal-title":"SIAM Journal on Computing"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, and R. Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pages 234\u2013248. IEEE Computer Society Press, 1990.","DOI":"10.1109\/RISP.1990.63854"},{"issue":"4","key":"2_CR8","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/49.17707","volume":"7","author":"R. A. Kemmerer","year":"1989","unstructured":"R. A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Areas in Communications, 7(4):448\u2013457, 1989.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TSE.1987.233151","volume":"13","author":"J. K. Millen","year":"1987","unstructured":"J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering, 13(2):274\u2013288, 1987.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"C. Meadows. Using Narrowing in the Analysis of Key Management Protocols. In Proceedings of the 1989 IEEE Symposium on Research in Security and Privacy, pages 138\u2013147. IEEE Computer Society Press, 1989.","DOI":"10.1109\/SECPRI.1989.36288"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the Computer Security Foundations Workshop III, pages 23\u201331. IEEE Computer Society Press, 1990.","DOI":"10.1109\/CSFW.1990.128182"},{"key":"2_CR12","unstructured":"M. J. Merritt. Cryptographic Protocols. PhD thesis, Georgia Institute of Technology, 1983."},{"issue":"5","key":"2_CR13","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1109\/5.4444","volume":"76","author":"J. H. Moore","year":"1988","unstructured":"J. H. Moore. Protocol Failures in Cryptosystems. Proceedings of the IEEE, 76(5):594\u2013602, May 1988.","journal-title":"Proceedings of the IEEE"},{"key":"2_CR14","unstructured":"M. Merritt and P. Wolper. States of Knowledge in Cryptographic Protocols (extended abstract). Unpublished Manuscript, 1985."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"P. Syverson. The Use of Logic in the Analysis of Cryptographic Protocols. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pages 156\u2013170. IEEE Computer Society Press, 1991.","DOI":"10.1109\/RISP.1991.130784"},{"key":"2_CR16","unstructured":"M-J. Toussaint. Formal Verification of Probabilistic Properties in Cryptographic Protocols (Extended Abstract). to appear in the proceedings of ASI-ACRYPT\u201991, 1991."},{"key":"2_CR17","volume-title":"Verification of Cryptographic Protocols","author":"M.-J. Toussaint","year":"1991","unstructured":"M.-J. Toussaint. Verification of Cryptographic Protocols. PhD thesis, Universit\u00e9 de Li\u00e8ge (Belgium), 1991."},{"key":"2_CR18","unstructured":"M-J. Toussaint and P. Wolper. Reasoning about Cryptographic Protocols (Extended Abstract). In Joan Feigenbaum and Michael Merritt, editors, Distributed Computing and Cryptography (October 1989), pages 245\u2013262. DI-MACS-Series in Discrete Mathematics and Theoretical Computer Science (AMS-ACM), 1991. Volume 2."},{"issue":"8","key":"2_CR19","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/0167-4048(89)90008-4","volume":"8","author":"V. Varadharajan","year":"1989","unstructured":"V. Varadharajan. Verification of Network Security Protocols. Computers & Security, 8(8):693\u2013708, 1989.","journal-title":"Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:13:26Z","timestamp":1605647606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_2","relation":{},"subject":[]}}