{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:56:28Z","timestamp":1742979388114,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031453151"},{"type":"electronic","value":"9783031453168"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-45316-8_26","type":"book-chapter","created":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:03:14Z","timestamp":1699228994000},"page":"418-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security Verification of\u00a0Instant Messaging Cryptographic Protocols"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2211-9693","authenticated-orcid":false,"given":"Gloria O. Olivares","family":"M\u00e9nez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5053-1796","authenticated-orcid":false,"given":"Kevin A. Delgado","family":"Vargas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3599-6077","authenticated-orcid":false,"given":"Felipe Bernstein","family":"Mery","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5212-350X","authenticated-orcid":false,"given":"Gina","family":"Gallegos-Garc\u00eda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,6]]},"reference":[{"key":"26_CR1","unstructured":"Asociaci\u00f3n para la Investigaci\u00f3n de Medios de Comunicaci\u00f3n $$|$$ AIMC. https:\/\/www.aimc.es\/. Accessed 06 June 2023"},{"key":"26_CR2","unstructured":"Situaci\u00f3n Global Mobile o M\u00f3vil 2021. https:\/\/yiminshum.com\/mobile-movil-mundo-2021\/. Accessed 06 June 2023"},{"key":"26_CR3","volume-title":"Handbook of Applied Cryptography","author":"A Menezes","year":"1996","unstructured":"Menezes, A., Vanstone, S.A., van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"26_CR4","unstructured":"Phishing attacks via WhatsApp, Telegram soar in India. https:\/\/www.siasat.com\/phishing-attacks-via-whatsapp-telegram-soar-in-india-2164308\/. Accessed 06 June 2023"},{"key":"26_CR5","unstructured":"WhatsApp Retransmission Vulnerability. https:\/\/boelter.blog\/2016\/04\/whats-app-retransmission-vulnerability\/. Accessed 06 June 2023"},{"key":"26_CR6","doi-asserted-by":"publisher","unstructured":"Schr\u00f6der, S., Huber, M., Wind, D., Rottermanner, C.: When SIGNAL hits the fan: on the usability and security of state-of-the-art secure mobile messaging. In European Workshop on Usable Security. IEEE, pp. 1\u20137 (2016) https:\/\/doi.org\/10.14722\/eurousec.2016.23012","DOI":"10.14722\/eurousec.2016.23012"},{"key":"26_CR7","doi-asserted-by":"publisher","unstructured":"Jakobsen, J., Orlandi, C.: On the CCA (in) security of MTProto. In Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 113\u2013116. (2016). https:\/\/doi.org\/10.1145\/2994459.2994468","DOI":"10.1145\/2994459.2994468"},{"key":"26_CR8","unstructured":"Andrie\u015f, \u015e., Miron, A. D., Cristian, A., Simion, E.: A survey on the security protocols employed by mobile messaging applications, Cryptology ePrint Archive, Paper 2022\/088 (2022). https:\/\/eprint.iacr.org\/2022\/088"},{"key":"26_CR9","doi-asserted-by":"publisher","unstructured":"Sajoh, D.I., Atiku, A.U., Naibi, R.S.: Secure messaging: analysis of signal protocol implementation in whatsapp and signal journal of digital innovations & contemp res. In Sc., Eng & Tech. vol. 6, No. 3. pp 63\u201372, (2018). https:\/\/doi.org\/10.22624\/AIMS\/DIGITAL\/V6N3P6","DOI":"10.22624\/AIMS\/DIGITAL\/V6N3P6"},{"key":"26_CR10","unstructured":"Bogos, C.E., Mocanu, R., Simion, E.: A security analysis comparison between Signal, WhatsApp and Telegram, Cryptology ePrint Archive, Paper 2023\/071 (2023). https:\/\/eprint.iacr.org\/2023\/071"},{"key":"26_CR11","doi-asserted-by":"publisher","unstructured":"Miculan, M., Vitacolonna, N.: Automated symbolic verification of telegram\u2019s MTProto 2.0. In Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, pp. 185\u2013197 (2020) https:\/\/doi.org\/10.48550\/arXiv.2012.03141","DOI":"10.48550\/arXiv.2012.03141"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","volume-title":"Public Key Cryptography","author":"S Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154\u2013170. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-49162-7_12"},{"key":"26_CR13","unstructured":"Global Mobile Messaging Forecast 2021. https:\/\/store.businessinsider.com\/products\/global-mobile-messaging-forecast-2021. Accessed 06 June 2023"},{"key":"26_CR14","unstructured":"WhatsApp, Messenger, Telegram, Snapchat: qui\u00e9nes y d\u00f3nde usan estas aplicaciones. https:\/\/cnnespanol.cnn.com\/2021\/10\/06\/whatsapp-telegram-snapchat-quien-y-en-donde-se-estan-usando-orix\/. Accessed 06 June 2023"},{"key":"26_CR15","unstructured":"WhatsApp Encryption Overview Technical white paper. https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf. Accessed 06 June 2023"},{"key":"26_CR16","unstructured":"End-to-End Encryption, Secret Chats. https:\/\/core.telegram.org\/api\/end-to-end. Accessed 06 June 2023"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption)*. J. Cryptology 15, 103\u2013127 (2002). https:\/\/doi.org\/10.1007\/s00145-001-0014-7","journal-title":"J. Cryptology"},{"key":"26_CR18","unstructured":"Lowe, G., Broadfoot, P., Dilloway, C.: A compiler for the Analysis of security protocol. Version 1.12, Oxford University Computing Laboratory (2009). http:\/\/www.cs.ox.ac.uk\/gavin.lowe\/Security\/Casper\/manual.pdf"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-642-39799-8_48","volume-title":"Computer Aided Verification","author":"S Meier","year":"2013","unstructured":"Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696\u2013701. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_48"},{"key":"26_CR20","unstructured":"Blanchet, B., Smyth, B., Cheval, V., Sylvestre, M.: ProVerif 2.04: Automatic cryptographic Protocol Verifier, User Manual and Tutorial (2021)"},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-65277-7_8","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2020","author":"N Kobeissi","year":"2020","unstructured":"Kobeissi, N., Nicolas, G., Tiwari, M.: Verifpal: cryptographic protocol analysis for the real world. In: Bhargavan, K., Oswald, E., Prabhakaran, M. (eds.) INDOCRYPT 2020. LNCS, vol. 12578, pp. 151\u2013202. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65277-7_8"},{"key":"26_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-14478-3_16","volume-title":"Recent Trends in Network Security and Applications","author":"R Patel","year":"2010","unstructured":"Patel, R., Borisaniya, B., Patel, A., Patel, D., Rajarajan, M., Zisman, A.: Comparative analysis of formal model checking tools for security protocol verification. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 152\u2013163. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14478-3_16"},{"issue":"9","key":"26_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-015-0276-5","volume":"39","author":"AK Das","year":"2015","unstructured":"Das, A.K., Odelu, V., Goswami, A.: A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS. J. Med. Syst. 39(9), 1\u201324 (2015). https:\/\/doi.org\/10.1007\/s10916-015-0276-5","journal-title":"J. Med. Syst."},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"CJF Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70545-1_38"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11513988_27"},{"key":"26_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/10721959_21","volume-title":"Automated Deduction - CADE-17","author":"T Genet","year":"2000","unstructured":"Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAllester, D. (ed.) CADE 2000. LNCS (LNAI), vol. 1831, pp. 271\u2013290. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/10721959_21"},{"key":"26_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-27257-8_20","volume-title":"Smart Card Research and Advanced Applications","author":"A Javed","year":"2011","unstructured":"Javed, A.: Formal analysis of CWA 14890-1. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 314\u2013335. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-27257-8_20"}],"container-title":["Communications in Computer and Information Science","Telematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-45316-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T00:07:44Z","timestamp":1699229264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-45316-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031453151","9783031453168"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-45316-8_26","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"6 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WITCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Congress of Telematics and Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Puerto Vallarta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mexico","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"witcom2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.witcom.upiita.ipn.mx\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"88","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}