{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:25:01Z","timestamp":1742912701165,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_45","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"453-462","source":"Crossref","is-referenced-by-count":0,"title":["Methodological Security Verification of a Registration Protocol"],"prefix":"10.1007","author":[{"given":"Jesus","family":"Diaz","sequence":"first","affiliation":[]},{"given":"David","family":"Arroyo","sequence":"additional","affiliation":[]},{"given":"Francisco B.","family":"Rodriguez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","unstructured":"European Union: Cybersecurity strategy of the european union. Technical report, Joint Communication to the European Parliament, the Council, the European Economic and social committee and the committee of the regions (2013)"},{"key":"45_CR2","unstructured":"Hernan, S., Lambert, S., Ostwald, T., Shostack, A.: Uncover security design flaws using the stride approach (2006), \n                    http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx"},{"key":"45_CR3","unstructured":"CCMB-2009-07-003: Common criteria for information technology security evaluation \u2013 part 3: Security assurance components. Technical report (July 2009)"},{"key":"45_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-14992-4_16","volume-title":"Financial Cryptography and Data Security","author":"S. Matsuo","year":"2010","unstructured":"Matsuo, S., Miyazaki, K., Otsuka, A., Basin, D.: How to evaluate the security of real-life cryptographic protocols? In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Seb\u00e9, F. (eds.) RLCPS, WECSR, and WLC 2010. LNCS, vol.\u00a06054, pp. 182\u2013194. Springer, Heidelberg (2010)"},{"issue":"0","key":"45_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jss.2013.09.020","volume":"89","author":"J. Diaz","year":"2014","unstructured":"Diaz, J., Arroyo, D., Rodriguez, F.B.: A formal methodology for integral security design and verification of network protocols. Journal of Systems and Software\u00a089(0), 87\u201398 (2014)","journal-title":"Journal of Systems and Software"},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Diaz, J., Arroyo, D., Rodriguez, F.B.: On securing online registration protocols: formal verification of a new proposal. Knowl.-Based Syst. (in press, 2014)","DOI":"10.1016\/j.knosys.2014.01.011"},{"issue":"6","key":"45_CR7","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSECP.2003.1253564","volume":"1","author":"S.L. Garfinkel","year":"2003","unstructured":"Garfinkel, S.L.: Email-based identification and authentication: An alternative to pki? IEEE Security & Privacy\u00a01(6), 20\u201326 (2003)","journal-title":"IEEE Security & Privacy"},{"key":"45_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-21323-6_27","volume-title":"Computational Intelligence in Security for Information Systems","author":"J. Diaz","year":"2011","unstructured":"Diaz, J., Arroyo, D., Rodriguez, F.B.: An approach for adapting Moodle into a secure infrastructure. In: Herrero, \u00c1., Corchado, E. (eds.) CISIS 2011. LNCS, vol.\u00a06694, pp. 214\u2013221. Springer, Heidelberg (2011)"},{"key":"45_CR9","unstructured":"Backes, M., Maffei, M., Pecina, K.: Automated synthesis of privacy-preserving distributed applications. In: Proc. of ISOC NDSS (2012)"},{"issue":"2","key":"45_CR10","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"45_CR11","unstructured":"Blanchet, B.: ProVerif Automatic Cryptographic Protocol Verifier User Manual. CNRS, D\u00e9partement d\u2019Informatique \u00c9cole Normale Sup\u00e9rieure, Paris (July 2010)"},{"issue":"4","key":"45_CR12","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B. Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security\u00a017(4), 363\u2013434 (2009)","journal-title":"Journal of Computer Security"},{"key":"45_CR13","unstructured":"Rolando, M.G.F., Salvador, C.H.: Knowledge system for application of computer security rules. In: Herrero, \u00c1., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 2009. AISC, vol.\u00a063, pp. 9\u201317. Springer, Heidelberg (2009)"},{"key":"45_CR14","unstructured":"Diaz, J., Arroyo, D., Rodriguez, F.B.: Pseudocode and ProVerif code for the analyzed protocol (2013), \n                    http:\/\/www.ii.uam.es\/~gnb\/dar13-psc-code.tgz"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T04:38:00Z","timestamp":1676867880000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_45","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}