{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:13:23Z","timestamp":1725484403872},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_1","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:12:26Z","timestamp":1179767546000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Inductive Analysis of the Internet Protocol TLS"],"prefix":"10.1007","author":[{"given":"Lawrence C.","family":"Paulson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"1_CR1","unstructured":"Tim Dierks and Christopher Allen. The TLS protocol: Version 1.0, November 1997. Internet-draft draft-ietf-tls-protocol-05.txt"},{"key":"1_CR2","unstructured":"Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol version 3.0."},{"key":"1_CR3","unstructured":"John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern. Finite-state analysis of SSL 3.0 and related protocols. In Hilarie Orman and Catherine Meadows, editors, Workshop on Design and Formal Verification of Security Protocols. DIMACS, September 1997."},{"key":"1_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0030541","volume-title":"Isabelle: A Generic Theorem Prover","author":"L. C. Paulson","year":"1994","unstructured":"Lawrence C. Paulson. Isabelle: A Generic Theorem Prover. Springer, 1994. LNCS 828."},{"key":"1_CR5","unstructured":"Lawrence C. Paulson. On two formal analyses of the Yahalom protocol. Technical Report 432, Computer Laboratory, University of Cambridge, July 1997."},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 1998. in press.","DOI":"10.3233\/JCS-1998-61-205"},{"key":"1_CR7","unstructured":"David Wagner and Bruce Schneier. Analysis of the SSL 3.0 protocol. On the Internet at \n                  http:\/\/www.cs.berkeley.edu\/~daw\/ssl3.0.ps\n                  \n                , 1996."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,9]],"date-time":"2020-01-09T03:51:42Z","timestamp":1578541902000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_1"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}