{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:33:50Z","timestamp":1725798830213},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111186"},{"type":"electronic","value":"9783319111193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11119-3_29","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T16:40:33Z","timestamp":1408034433000},"page":"312-324","source":"Crossref","is-referenced-by-count":0,"title":["A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Licai","family":"Liu","sequence":"first","affiliation":[]},{"given":"Bingxing","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Beiting","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Li, S., Xu, L., Zhao, S.: The internet of things: a survey. Information Systems Frontiers, 1\u201317 (2014)","key":"29_CR1","DOI":"10.1007\/s10796-014-9492-7"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, N., Jensen, C.D.: Definition of entity authentication. In: Proc. of 2010 2nd International Workshop on Security and Communication Networks (IWSCN), pp. 1\u20137 (2010)","key":"29_CR2","DOI":"10.1109\/IWSCN.2010.5498000"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0304-3975(02)00365-1","volume":"291","author":"R. Focardi","year":"2003","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: A comparison of three authentication properties. Theoretical Computer Science\u00a0291(3), 285\u2013327 (2003)","journal-title":"Theoretical Computer Science"},{"issue":"1871","key":"29_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. Proc. of the Royal Society of London. Series A. Mathematical and Physical Sciences\u00a0426(1871), 233\u2013271 (1989)","journal-title":"Proc. of the Royal Society of London. Series A. Mathematical and Physical Sciences"},{"doi-asserted-by":"crossref","unstructured":"Gollmann, D.: What do we mean by entity authentication? In: Proc. of 1996 IEEE Symposium on Security and Privacy, pp. 46\u201354 (1996)","key":"29_CR5","DOI":"10.1109\/SECPRI.1996.502668"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-45499-3_20","volume-title":"Algebraic Methodology and Software Technology","author":"R. Focardi","year":"2000","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Message Authentication through Non Interference. In: Rus, T. (ed.) AMAST 2000. LNCS, vol.\u00a01816, pp. 258\u2013272. Springer, Heidelberg (2000)"},{"doi-asserted-by":"crossref","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proc. of the 10th IEEE Workshop on Computer Security Foundations, Rockport, MA, USA, pp. 31\u201343 (1997)","key":"29_CR7","DOI":"10.1109\/CSFW.1997.596782"},{"issue":"1","key":"29_CR8","first-page":"263","volume":"72","author":"M. Kurkowski","year":"2006","unstructured":"Kurkowski, M., Srebrny, M.: A Quantifier-free First-order Knowledge Logic of Authentication. Fundamenta Informaticae\u00a072(1), 263\u2013282 (2006)","journal-title":"Fundamenta Informaticae"},{"doi-asserted-by":"crossref","unstructured":"Schneider, S.: Security properties and CSP. In: Proc. of 1996 IEEE Symposium on Security and Privacy, pp. 174\u2013187 (1996)","key":"29_CR9","DOI":"10.1109\/SECPRI.1996.502680"},{"doi-asserted-by":"crossref","unstructured":"Zhou, J.Y., Gollmann, D.: A fair non-repudiation protocol. In: Proc. of 1996 IEEE Symposium on Security and Privacy, pp. 55\u201361 (1996)","key":"29_CR10","DOI":"10.1109\/SECPRI.1996.502669"},{"unstructured":"Focardi, R., Gorrieri, R.: An Information Flow Security Property for CCS. In: Proc. of the Second North American Process Algebra Workshop (NAPAW 1993), Cornell, Ithaca, pp. 1\u201311 (1993)","key":"29_CR11"},{"key":"29_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-540-24631-2_4","volume-title":"Foundations of Security Analysis and Design II","author":"R. Focardi","year":"2004","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Classification of security properties - (Part II: Network security). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol.\u00a02946, pp. 139\u2013185. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Woo, T.Y.C., Lam, S.S.: A semantic model for authentication protocols. In: Proc. of 1993 IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 178\u2013194 (1993)","key":"29_CR13","DOI":"10.1109\/RISP.1993.287633"},{"issue":"1","key":"29_CR14","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/JSAC.2002.806132","volume":"21","author":"D. Gollmann","year":"2003","unstructured":"Gollmann, D.: \u201cAuthentication by correspondence. IEEE Journal on Selected Areas in Communications\u00a021(1), 88\u201395 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"doi-asserted-by":"crossref","unstructured":"Ahmed, N., Jensen, C.D.: Demarcation of Security in Authentication Protocols. In: Proc. of 2011 First SysSec Workshop (SysSec), pp. 43\u201350 (2011)","key":"29_CR15","DOI":"10.1109\/SysSec.2011.13"},{"issue":"7","key":"29_CR16","first-page":"1424","volume":"36","author":"G. Yunchuan","year":"2013","unstructured":"Yunchuan, G., Bingxing, F., Lihua, Y., Yuan, Z.: A Security Model for Confidentiality and Integrity in Mobile Computing. Chinese Journal of Computers\u00a036(7), 1424\u20131433 (2013)","journal-title":"Chinese Journal of Computers"},{"issue":"1","key":"29_CR17","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TNSM.2011.113011.100139","volume":"9","author":"M. Younis","year":"2012","unstructured":"Younis, M., Farrag, O., Althouse, B.: TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks. IEEE Transactions on Network and Service Management\u00a09(1), 100\u2013113 (2012)","journal-title":"IEEE Transactions on Network and Service Management"},{"doi-asserted-by":"crossref","unstructured":"Ma, D., Tsudik, G.: Extended Abstract: Forward-Secure Sequential Aggregate Authentication. In: Proc. of 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 86\u201391 (2007)","key":"29_CR18","DOI":"10.1109\/SP.2007.18"},{"doi-asserted-by":"crossref","unstructured":"Wang, M., Zhu, H., Zhao, Y., Liu, S.: Modeling and Analyzing the (mu)TESLA Protocol Using CSP. In: Proc. of 2011 Fifth International Symposium on Theoretical Aspects of Software Engineering (TASE), pp. 247\u2013250 (2011)","key":"29_CR19","DOI":"10.1109\/TASE.2011.10"},{"issue":"A","key":"29_CR20","first-page":"7","volume":"2","author":"R. Singh","year":"2013","unstructured":"Singh, R., Sharma, T.P.: Proof of the Secrecy Property of Secure WLAN Authentication Scheme ( SWAS ) Using Extended Protocol Composition Logic. Journal of Safety Engineering\u00a02(A), 7\u201313 (2013)","journal-title":"Journal of Safety Engineering"},{"issue":"2","key":"29_CR21","doi-asserted-by":"crossref","first-page":"191","DOI":"10.3233\/JCS-1999-72-304","volume":"7","author":"F.J.T. F\u00e1brega","year":"1999","unstructured":"F\u00e1brega, F.J.T., Jonathan, C.H., Joshua, D.G.: Strand spaces: proving security protocols correct. Journal of Computer Security\u00a07(2), 191\u2013230 (1999)","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"Paulson, L.C.: Proving properties of security protocols by induction. In: Proc. of the 10th Computer Security Foundations Workshop, pp. 70\u201383 (1997)","key":"29_CR22","DOI":"10.1109\/CSFW.1997.596788"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/10722599_14","volume-title":"Computer Security - ESORICS 2000","author":"N. Evans","year":"2000","unstructured":"Evans, N., Schneider, S.: Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 222\u2013237. Springer, Heidelberg (2000)"},{"issue":"1","key":"29_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M. Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation\u00a0148(1), 1\u201370 (1999)","journal-title":"Information and Computation"},{"key":"29_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2013.03.018","volume":"81","author":"T. Mazur","year":"2014","unstructured":"Mazur, T., Lowe, G.: CSP-based counter abstraction for systems with node identifiers. Science of Computer Programming\u00a081, 3\u201352 (2014)","journal-title":"Science of Computer Programming"},{"key":"29_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-15497-3_20","volume-title":"Computer Security \u2013 ESORICS 2010","author":"T. Dinh","year":"2010","unstructured":"Dinh, T., Ryan, M.: Verifying Security Property of Peer-to-Peer Systems Using CSP. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.\u00a06345, pp. 319\u2013339. Springer, Heidelberg (2010)"},{"unstructured":"Roscoe, A.W.: \u201cOn the expressiveness of CSP,\u201d Technical report Oxford University (2011), http:\/\/www.cs.ox.ac.uk\/files\/1383\/expressive.pdf (accessed May, 2014)","key":"29_CR27"},{"key":"29_CR28","volume-title":"The Theory and Practice of Concurrency","author":"A.W. Roscoe","year":"2010","unstructured":"Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Upper Saddle River (2010)"},{"key":"29_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"29_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-30108-0_14","volume-title":"Computer Security \u2013 ESORICS 2004","author":"D. Oheimb von","year":"2004","unstructured":"von Oheimb, D.: Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol.\u00a03193, pp. 225\u2013243. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11119-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T19:15:03Z","timestamp":1565723703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11119-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111186","9783319111193"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11119-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}