{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:01:34Z","timestamp":1767772894571},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-48285-7_20","type":"book-chapter","created":{"date-parts":[[2007,8,1]],"date-time":"2007-08-01T02:16:46Z","timestamp":1185934606000},"page":"240-247","source":"Crossref","is-referenced-by-count":45,"title":["On a Limitation of BAN Logic"],"prefix":"10.1007","author":[{"given":"Colin","family":"Boyd","sequence":"first","affiliation":[]},{"given":"Wenbo","family":"Mao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Colin Boyd, A Formal Framework for Authentication, Computer Security-ES-ORICS 92, pp.273\u2013292, Springer-Verlag, 1992.","DOI":"10.1007\/BFb0013903"},{"key":"20_CR2","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"A426","author":"M. Burrows","year":"1989","unstructured":"M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, Proceedings of the Royal Society, Vol A426,pp 233\u2013271,1989.","journal-title":"Proceedings of the Royal Society"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham & R. Yahalom, Reasoning about Belief in Cryptographic Protocols, Proceedings of IEEE Symposium on Research in Security and Privacy, pp.234\u2013248, 1990.","DOI":"10.1109\/RISP.1990.63854"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"R. Kailar & V.D. Gligor, On Belief Evolution in Authentication Protocols, Proceedings of IEEE Symposium on Research in Security and Privacy, pp.103\u2013116, 1991.","DOI":"10.1109\/CSFW.1991.151576"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Wenbo Mao & Colin Boyd, Towards Formal Analysis of Security Protocols, Proceedings of Sixth IEEE Workshop on Foundations of Computer Security, pp 147\u2013158, June, 1993.","DOI":"10.1109\/CSFW.1993.246631"},{"key":"20_CR6","unstructured":"Chris Mitchell & Andy Thomas, Standardising Authentication Protocols based on Public Key Techniques, circulated within BSI IST\/33\/-2, 1992."},{"key":"20_CR7","unstructured":"R.M. Needham, Reasoning about Cryptographic Protocols, Presented at ESORICS 92."},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/382258.382789","volume":"24","author":"D.M. Nessett","year":"1990","unstructured":"D.M. Nessett, A Critique of the Burrows, Abadi and Needham Logic, ACM Operating Systems Review, 24,2,pp.35\u201338,1990.","journal-title":"ACM Operating Systems Review"},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/24592.24594","volume":"21","author":"D. Otway","year":"1987","unstructured":"Dave Otway & Owen Rees, Efficient and Timely Mutual Authentication ACM Operating Systems Review, 21,1,pp. 8\u201310, 1987.","journal-title":"ACM Operating Systems Review"},{"key":"20_CR10","unstructured":"Paul van Oorschot, An Alternate Explanation of two BAN-logic \u201cfailures\u201d, Talk delivered at the Rump Session of Eurocrypt 93."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:50:25Z","timestamp":1619571025000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540576006"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_20","relation":{},"subject":[]}}