{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T04:32:57Z","timestamp":1726029177885},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030190514"},{"type":"electronic","value":"9783030190521"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19052-1_3","type":"book-chapter","created":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T01:11:42Z","timestamp":1558573902000},"page":"8-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Key Reminiscences"],"prefix":"10.1007","author":[{"given":"Paul","family":"Syverson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2, August 2008. https:\/\/tools.ietf.org\/html\/rfc5246","DOI":"10.17487\/rfc5246"},{"issue":"2","key":"3_CR2","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/BF00197942","volume":"7","author":"R Kemmerer","year":"1994","unstructured":"Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. J. Cryptol. 7(2), 79\u2013130 (1994)","journal-title":"J. Cryptol."},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1), 44\u201354 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-319-23165-5_22","volume-title":"Logic, Rewriting, and Concurrency","author":"C Meadows","year":"2015","unstructured":"Meadows, C.: Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. In: Mart\u00ed-Oliet, N., \u00d6lveczky, P.C., Talcott, C. (eds.) Logic, Rewriting, and Concurrency. LNCS, vol. 9200, pp. 475\u2013492. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23165-5_22"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0000430","volume-title":"Advances in Cryptology \u2014 ASIACRYPT\u201994","author":"CA Meadows","year":"1995","unstructured":"Meadows, C.A.: Formal verification of cryptographic protocols: a survey. In: Pieprzyk, J., Safavi-Naini, R. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133\u2013150. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/BFb0000430"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3, August 2018. https:\/\/tools.ietf.org\/html\/rfc8446","DOI":"10.17487\/RFC8446"},{"issue":"1\/2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1023\/A:1018069220646","volume":"7","author":"P Syverson","year":"1996","unstructured":"Syverson, P., Meadows, C.: A formal language for cryptographic protocol requirements. Des. Codes Crypt. 7(1\/2), 27\u201359 (1996)","journal-title":"Des. Codes Crypt."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Wang, L., Asharov, G., Pass, R., Ristenpart, T., shelat, a.: Blind certificate authorities. In: Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P 2019), May 2019. https:\/\/eprint.iacr.org\/2018\/1022","DOI":"10.1109\/SP.2019.00007"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security, Protocols, and Equational Reasoning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19052-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T04:03:36Z","timestamp":1574741016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19052-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030190514","9783030190521"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19052-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}