{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:10:05Z","timestamp":1737123005972,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_29","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:12:26Z","timestamp":1179767546000},"page":"213-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Insider Fraud"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gollmann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"29_CR1","unstructured":"Michael Burrows, Mart\u2976 Abadi, and Roger Needham. A logic of authentication. DEC Systems Research Center, Report 39, revised February 22 1990."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Dieter Gollmann. What do we mean by entity authentication? In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 46\u201354, 1996.","DOI":"10.1109\/SECPRI.1996.502668"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Gavin Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131\u2013133, 1995.","journal-title":"Information Processing Letters"},{"key":"29_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Proceedings of TACAS","author":"G. Lowe","year":"1996","unstructured":"Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, pages 147\u2013166. Springer LNCS 1055, 1996."},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Gavin Lowe. Some new attacks upon security protocols. In Proceedings of the 9th IEEE Computer Security Foundations Workshop, pages 162\u2013169, 1996.","DOI":"10.1109\/CSFW.1996.503701"},{"key":"29_CR6","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. M. Needham","year":"1978","unstructured":"Roger M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. CACM, 21:993\u2013999, 1978.","journal-title":"CACM"},{"key":"29_CR7","unstructured":"Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Technical Report 443, Computer Laboratory, University of Cambridge, February 1998."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"A.W. Roscoe. Intensional specifications of security protocols. In Proceedings of the 9th IEEE Computer Security Foundations Workshop, pages 28\u201338, 1996.","DOI":"10.1109\/CSFW.1996.503688"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Paul Syverson. Adding time to a logic of authentication. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 97\u2013101, 1993.","DOI":"10.1145\/168588.168600"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T14:39:00Z","timestamp":1737038340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_29"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}