{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:20:40Z","timestamp":1725664840188},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540635338"},{"type":"electronic","value":"9783540695936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-63533-5_19","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T23:28:57Z","timestamp":1330298937000},"page":"358-377","source":"Crossref","is-referenced-by-count":0,"title":["Verification of cryptographic protocols: An experiment"],"prefix":"10.1007","author":[{"given":"Marc Mehdi","family":"Ayadi","sequence":"first","affiliation":[]},{"given":"Dominique","family":"Bolignano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,8]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"M. Abadi and Marc.R. Tuttle. A Semantics for a Logic of Authentication. In Proceedings of the 10th Annual ACM Symposium On Principles of Distributed Computing, pages 201\u2013216, August 1991.","key":"19_CR1","DOI":"10.1145\/112600.112618"},{"key":"19_CR2","series-title":"Technical report","volume-title":"Logics for Cryptographic Protocols: a Survey","author":"M. Ayadi","year":"1997","unstructured":"M. Ayadi. Logics for Cryptographic Protocols: a Survey. Technical report, University of Paris IX-Dauphine, 1997."},{"unstructured":"J.P. Ban\u00e2tre and D. LeM\u00e9tayer. Programming by Multiset Transformation. Technical Report 117, IRISA Rennes, March 1990.","key":"19_CR3"},{"issue":"5","key":"19_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/381906.381946","volume":"20","author":"S.M. Bellovin","year":"1990","unstructured":"S.M. Bellovin and M. Merritt. Limitations of the Kerberos Authentication System. In Computer Communications Review 20(5), pages 119\u2013132., October 1990.","journal-title":"Computer Communications Review"},{"doi-asserted-by":"crossref","unstructured":"P. Bieber and N. Boulahia-Cuppens. Formal Development of Authentication Protocols. In BCS-FAGS sixth Refinement Workshop, 1994.","key":"19_CR5","DOI":"10.1007\/978-1-4471-3240-0_5"},{"unstructured":"D. Bolignano. V\u00e9rification Formelle de Protocoles Cryptographiques \u00e0 l'aide de Coq. In Actes des journ\u00e9s GDR, 1995.","key":"19_CR6"},{"doi-asserted-by":"crossref","unstructured":"D. Bolignano. Formal Verification of Cryptographic Protocols. In Proceedings of the third ACM Conference on Computer and Communication Security, 1996.","key":"19_CR7","DOI":"10.1145\/238168.238196"},{"key":"19_CR8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. In Proceedings of the Royal Society of London A Vol.426, pages 233\u2013271, 1989.","journal-title":"Proceedings of the Royal Society of London A"},{"doi-asserted-by":"crossref","unstructured":"K.M. Chandy and J. Misra. Parallel Program Design. Addison-Wesley, 1990.","key":"19_CR9","DOI":"10.1007\/978-1-4613-9668-0_6"},{"doi-asserted-by":"crossref","unstructured":"P.C. Chen and V.D. Gligor. On the Formal Specification and Verification of a Multiparty Session Protocol. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1990.","key":"19_CR10","DOI":"10.1109\/RISP.1990.63853"},{"unstructured":"G.Huet. The Gilbreath Trick: A Case Study in Axiomatization and Proof Development in the Coq Proof Assistant. In INRIA Research Report 1511, September 1991.","key":"19_CR11"},{"doi-asserted-by":"crossref","unstructured":"L. Gong, R. Needham, and R. Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 234\u2013248. IEEE, 1990.","key":"19_CR12","DOI":"10.1109\/RISP.1990.63854"},{"unstructured":"B.C. Neuman J.G. Steiner and J.I. Schiller. Kerberos: An Authentication Service for Open Network Systems. Usenix Conference Proceedings, Dallas, Texas, pages 191\u2013202, Feb 1988.","key":"19_CR13"},{"doi-asserted-by":"crossref","unstructured":"R.A. Kemmerer. Analyzing Encryption Protocols Using Formal Verification Techniques. IEEE Journal on Selected Area in Communications, volume 7(4), 1989.","key":"19_CR14","DOI":"10.1109\/49.17707"},{"unstructured":"J.T Kohl. The Evolution of the Kerberos Authentication Service. European Conference Proceedings, Troms, Norway, pages 295\u2013313, May 1991.","key":"19_CR15"},{"doi-asserted-by":"crossref","unstructured":"J.T Kohl and B.C. Neuman. The Kerberos Network Authentication Service (V5). Internet RFC 1510, Sep 1993.","key":"19_CR16","DOI":"10.17487\/rfc1510"},{"issue":"4","key":"19_CR17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/163640.163643","volume":"27","author":"A. Liebl","year":"1993","unstructured":"Armin Liebl. Authentification in Distributed Systems: A Bibliography. ACM Operating Systems Review, 27(4), pages 31\u201341, October 1993.","journal-title":"ACM Operating Systems Review"},{"doi-asserted-by":"crossref","unstructured":"Gavin Lowe. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 1995.","key":"19_CR18","DOI":"10.1016\/0020-0190(95)00144-2"},{"unstructured":"C. Meadows. Using Narrowing in the Analysis of Key Management. In Proceedings of the IEEE Symposium on Research in Security and Privacy., June 1989.","key":"19_CR19"},{"doi-asserted-by":"crossref","unstructured":"C. Meadows. Representing Partial Knowledge in an Algebraic Security Model. In Proceedings of the IEEE Computer Security Foundations Workshop VII, Franconia, New-Hampshire., June 1990.","key":"19_CR20","DOI":"10.1109\/CSFW.1990.128182"},{"unstructured":"C. Meadows. A System for the Analysis of a Key Management Protocol. In Proceedings of the IEEE Symposium on Research in Security and Privacy., June 1991.","key":"19_CR21"},{"doi-asserted-by":"crossref","unstructured":"C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. In Journal of Computer Security., June 1992.","key":"19_CR22","DOI":"10.3233\/JCS-1992-1102"},{"unstructured":"T.A. Parker. A Secure European System for Applications in a Multi-vendor Environment (The SESAME project). In Proceedings of the 14th American National Security Conference., 1991.","key":"19_CR23"},{"unstructured":"D. Pinkas and T.A. Parker. SESAME Technology Version Two-an Overview., Sep 1994.","key":"19_CR24"},{"unstructured":"D. Pinkas and T.A. Parker. SESAME Technology Version Three-Overview., Sep 1995.","key":"19_CR25"},{"unstructured":"A. W. Roscoe. Developing and Verifying Protocols in CSP. In Proceedings of Mierlo-workshop on protocols. TU Eindhoven, 1993.","key":"19_CR26"},{"unstructured":"A.D. Rubin and P. Honeyman. Formal Methods for the Analysis of Authentication Protocols. Technical report, Center for Information Technology Integration, 1993. University of Michigan. Internal Draft.","key":"19_CR27"}],"container-title":["Lecture Notes in Computer Science","FME '97: Industrial Applications and Strengthened Foundations of Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-63533-5_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:18:47Z","timestamp":1605647927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-63533-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540635338","9783540695936"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/3-540-63533-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}