{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:17:59Z","timestamp":1725488279292},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540576006"},{"type":"electronic","value":"9783540482857"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-48285-7_39","type":"book-chapter","created":{"date-parts":[[2007,7,31]],"date-time":"2007-07-31T22:16:46Z","timestamp":1185920206000},"page":"443-447","source":"Crossref","is-referenced-by-count":5,"title":["An Alternate Explanation of two BAN-logic \u201cfailures\u201d"],"prefix":"10.1007","author":[{"given":"Paul C.","family":"van Oorschot","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,7,13]]},"reference":[{"key":"39_CR1","unstructured":"M. Abadi, M. Tuttle. \u201cA semantics for a logic of authentication\u201d. Proc. 1991 ACM Symp. on Principles of Distributed Computing, 201\u2013216."},{"key":"39_CR2","unstructured":"C. Boyd, W. Mao, \u201cOn a Limitation of BAN Logic\u201d, presented at Eurocrypt93\u2019, Lofthus, Norway, 1993 May 24\u201326 (to appear in these proceedings)."},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, R. Needham, \u201cA logic of authentication\u201d, ACM Trans. Computer Systems\n                  8 (Feb. 1990), 18\u201336. A more detailed version is available in: M. Burrows, M. Abadi and R. Needham, \u201cA logic of authentication\u201d, Digital Systems Research Centre SRC Report #39 (1990 Feb. 22), 62 pages.","journal-title":"ACM Trans. Computer Systems"},{"key":"39_CR4","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/BF00196790","volume":"3","author":"K. Gaarder","year":"1991","unstructured":"K. Gaarder, E. Snekkenes, \u201cApplying a formal analysis technique to CCITT X.509 strong two-way authentication protocol\u201d, J. Cryptology 3 (Jan. 1991), 81\u201398.","journal-title":"J. Cryptology"},{"key":"39_CR5","unstructured":"V. Gligor, R. Kailar, S. Stubblebine, L. Gong. \u201cLogics for cryptographic protocols \u2014 virtues and limitations\u201d. Proc. IEEE 1991 Computer Security Foundations Workshop (Franconia, New Hampshire)."},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, R. Yahalom. \u201cReasoning about belief in cryptographic protocols\u201d. Proc. 1990 IEEE Symp. on Security and Privacy (Oakland, CA), 234\u2013248.","DOI":"10.1109\/RISP.1990.63854"},{"key":"39_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/382258.382789","volume":"24","author":"D.M. Nessett","year":"1990","unstructured":"D.M. Nessett \u201cA critique of the Burrows, Abadi and Needham logic\u201d. Operating Systems Review 24 (1990), 35\u201338.","journal-title":"Operating Systems Review"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"P. Van Oorschot. \u201cExtending cryptographic logics of belief to key agreement protocols\u201d. Proc. 1\n                  \n                    st\n                  \n                  ACM Conference on Communications and Computer Security (Fairfax, Virginia, Nov. 3\u20135 1993).","DOI":"10.1145\/168588.168617"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 EUROCRYPT \u201993"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48285-7_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T16:28:15Z","timestamp":1550420895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48285-7_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540576006","9783540482857"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/3-540-48285-7_39","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1994]]}}}