{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:06:50Z","timestamp":1746504410460,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319123998"},{"type":"electronic","value":"9783319124001"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12400-1_9","type":"book-chapter","created":{"date-parts":[[2014,10,28]],"date-time":"2014-10-28T15:15:00Z","timestamp":1414509300000},"page":"69-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)"],"prefix":"10.1007","author":[{"given":"Michele","family":"Peroli","sequence":"first","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Zavatteri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,29]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-28756-5_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Armando","year":"2012","unstructured":"Armando, A., Arsac, W., Avanesov, T., Barletta, M., Calvi, A., Cappai, A., Carbone, R., Chevalier, Y., Compagna, L., Cu\u00e9llar, J., Erzse, G., Frau, S., Minea, M., M\u00f6dersheim, S., von Oheimb, D., Pellegrino, G., Ponta, S.E., Rocchetto, M., Rusinowitch, M., Torabi Dashti, M., Turuani, M., Vigan\u00f2, L.: The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures. In: Flanagan, C., K\u00f6nig, B. (eds.) TACAS 2012. LNCS, vol. 7214, pp. 267\u2013282. Springer, Heidelberg (2012)"},{"issue":"31","key":"9_CR2","doi-asserted-by":"publisher","first-page":"4007","DOI":"10.1016\/j.tcs.2011.04.006","volume":"412","author":"D Basin","year":"2011","unstructured":"Basin, D., Caleiro, C., Ramos, J., Vigan\u00f2, L.: Distributed temporal logic for the analysis of security protocol models. Theor. Comput. Sci. 412(31), 4007\u20134043 (2011)","journal-title":"Theor. Comput. Sci."},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/11542322_3","volume-title":"Security Protocols","author":"G Bella","year":"2005","unstructured":"Bella, G.: A protocol\u2019s life after attacks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 11\u201318. Springer, Heidelberg (2005)"},{"key":"9_CR4","first-page":"313","volume":"3","author":"G Bella","year":"2008","unstructured":"Bella, G., Bistarelli, S., Massacci, F.: Retaliation against protocol attacks. J. Inf. Assur. Secur. 3, 313\u2013325 (2008)","journal-title":"J. Inf. Assur. Secur."},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proceedings of CSF\u201901, pp. 82\u201396. IEEE CS Press (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"9_CR6","series-title":"Information Security and Cryptography","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, Heidelberg (2003)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Ciob\u00e2c\u01ce, S., Cortier, V.: Protocol composition for arbitrary primitives. In: Proceedings of CSF\u201910. IEEE CS Press (2010)","DOI":"10.1109\/CSF.2010.29"},{"key":"9_CR8","unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0 (1997)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-41098-7_5","volume-title":"Security and Trust Management","author":"M Conti","year":"2013","unstructured":"Conti, M., Dragoni, N., Gottardo, S.: MITHYS: mind the hand you shake - protecting mobile devices from SSL usage vulnerabilities. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol. 8203, pp. 65\u201381. Springer, Heidelberg (2013)"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10703-008-0059-4","volume":"34","author":"V Cortier","year":"2009","unstructured":"Cortier, V., Delaune, S.: Safely composing security protocols. Form. Methods Syst. Des. 34(1), 1\u201336 (2009)","journal-title":"Form. Methods Syst. Des."},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"CJF Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The Scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008)"},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-03829-7_1","volume-title":"Foundations of Security Analysis and Design V","author":"S Escobar","year":"2007","unstructured":"Escobar, S., Meadows, C., Meseguer, J.: Maude-NPA: cryptographic protocol analysis modulo equational properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007\/2008\/2009. LNCS, vol. 5705, pp. 1\u201350. Springer, Heidelberg (2007)"},{"key":"9_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-35755-8_21","volume-title":"E-Business and Telecommunications","author":"M-C Fiazza","year":"2012","unstructured":"Fiazza, M.-C., Peroli, M., Vigan\u00f2, L.: Attack interference: a path to defending security protocols. In: Obaidat, M.S., Sevillano, J.L., Filipe, J. (eds.) ICETE 2011. CCIS, vol. 314, pp. 296\u2013314. Springer, Heidelberg (2012)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Fiazza, M.-C., Peroli, M., Vigano, L.: An environmental paradigm for defending security protocols. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), May 2012, pp. 427\u2013438 (2012)","DOI":"10.1109\/CTS.2012.6261087"},{"key":"9_CR16","unstructured":"ISO: ISO-IEC JTC1.27.02.2(20.03.1.2) entity authentication using symmetric techniques. International Organization for Standardization (ISO) (1990)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-04444-1_21","volume-title":"Computer Security \u2013 ESORICS 2009","author":"S M\u00f6dersheim","year":"2009","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: Secure pseudonymous channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 337\u2013354. Springer, Heidelberg (2009)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Peroli, M., Vigan\u00f2, L., Zavatteri, M.: Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) (2014). http:\/\/arxiv.org\/abs\/1405.6912","DOI":"10.1007\/978-3-319-12400-1_9"},{"key":"9_CR19","volume-title":"Modelling and Analysis of Security Protocols","author":"P Ryan","year":"2000","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison Wesley, Reading (2000)"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L.: Automated security protocol analysis with the AVISPA tool. Electron. Notes Theor. Comput. Sci. 155, 61\u201386 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12400-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T18:00:26Z","timestamp":1746468026000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12400-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319123998","9783319124001"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12400-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"29 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}