{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:07:44Z","timestamp":1725487664110},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540660866"},{"type":"electronic","value":"9783540487548"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48754-9_6","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T16:20:56Z","timestamp":1184602856000},"page":"32-34","source":"Crossref","is-referenced-by-count":1,"title":["Automated Reasoning and the Verification of Security Protocols"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Massacci","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,11]]},"reference":[{"key":"6_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/BFb0015258","volume-title":"Computer Science Today","author":"R. Anderson","year":"1996","unstructured":"R. Anderson and R. Needham. Programming Satan\u2019s computer. In Computer Science Today, LNCS 1000, pp. 426\u2013440. Springer-Verlag, 1996."},{"key":"6_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055875","volume-title":"Proc. of ESORICS-98","author":"G. Bella","year":"1998","unstructured":"G. Bella and L. Paulson. Kerberos version IV: inductive analysis of the secrecy goals. In Proc. of ESORICS-98, LNCS 1485. Springer-Verlag, 1998."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"D. Bolignano. An approach to the formal verification of cryptographic protocols. In Proc. of the 3th ACM Conf. on Comm. and Comp. Security, pp. 106\u2013118, 1996.","DOI":"10.1145\/238168.238196"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"S. Brackin. A HOL extension of GNY for automatically cryptographic protocols. In Proc. of the 9th IEEE Comp. Sec. Found. Workshop. IEEE Press, 1996.","DOI":"10.1109\/CSFW.1996.503691"},{"issue":"1","key":"6_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, and R. Needham. A logic for authentication. ACM TOCS, 8(1):18\u201336, 1990.","journal-title":"ACM TOCS"},{"issue":"9","key":"6_CR6","first-page":"550","volume":"23","author":"R. Focardi","year":"1997","unstructured":"R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE TOSE, 23(9):550\u2013571, 1997.","journal-title":"IEEE TOSE"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"D. Gollmann. What do we mean by entity authentication. In Proc. of the 15th IEEE Symp. on Sec. and Privacy, pp. 46\u201354. IEEE Press, 1996.","DOI":"10.1109\/SECPRI.1996.502668"},{"key":"6_CR8","unstructured":"International Organization for Standardization. ISO\/IEC Draft Int. Std. 10181-2.2 IT-Open System Interconnection-Security Framework for Open Systems: Authentication Framework, 1993. Section 8.1.5."},{"key":"6_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Proc. of TACAS","author":"G. Lowe","year":"1996","unstructured":"G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In Proc. of TACAS, LNCS 1055, pp. 147\u2013166. Springer-Verlag, 1996."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"W. Mao and C. Boyd. Towards formal analysis of security protocols. In Proc. of the 6th IEEE Comp. Sec. Foundations Workshop, pp. 147\u2013158. IEEE Press, 1993.","DOI":"10.1109\/CSFW.1993.246631"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"B. Marick. The VERUS design verification system. In Proc. of the 2nd IEEE Symp. on Sec. and Privacy, pp. 150\u2013157. IEEE Press, 1983.","DOI":"10.1109\/SP.1983.10002"},{"key":"6_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0000430","volume-title":"Proc. of ASIACRYPT-94","author":"C. Meadows","year":"1995","unstructured":"C. Meadows. Formal verification of cryptographic protocols: A survey. In Proc. of ASIACRYPT-94, LNCS 917, pp. 133\u2013150. Springer-Verlag, 1995."},{"issue":"12","key":"6_CR13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. CACM, 21(12):993\u2013999, 1978.","journal-title":"CACM"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"L. Paulson. The inductive approach to verifying cryptographic protocols. J. of Computer Security, 1998.","DOI":"10.3233\/JCS-1998-61-205"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"P. Syverson, and P. van Oorschot. On Unifying Some Cryptographic Protocols Logics. In Proc. of the 13th IEEE Symp. on Sec. and Privacy. IEEE Press, 1994.","DOI":"10.21236\/ADA465512"}],"container-title":["Lecture Notes in Computer Science","Automated Reasoning with Analytic Tableaux and Related Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48754-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T03:29:56Z","timestamp":1556681396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48754-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540660866","9783540487548"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-48754-9_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}