{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:38:42Z","timestamp":1743050322801,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243689"},{"type":"electronic","value":"9783319243696"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24369-6_38","type":"book-chapter","created":{"date-parts":[[2015,9,10]],"date-time":"2015-09-10T18:46:37Z","timestamp":1441910797000},"page":"461-474","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Verification of Mutual Authentication Protocol for MobInfoSec System"],"prefix":"10.1007","author":[{"given":"Olga","family":"Siedlecka-Lamch","sequence":"first","affiliation":[]},{"given":"Imed","family":"El Fray","sequence":"additional","affiliation":[]},{"given":"Miros\u0142aw","family":"Kurkowski","sequence":"additional","affiliation":[]},{"given":"Jerzy","family":"Peja\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,30]]},"reference":[{"key":"38_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"key":"38_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-09527-0","volume-title":"Protocols for Authentication and Key Establishment","author":"C Boyd","year":"2003","unstructured":"Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer-Verlag, Heidelberg (2003)"},{"key":"38_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24073-7","volume-title":"Cryptographic Protocol Security Analysis Based on Trusted Freshness","author":"L Dong","year":"2012","unstructured":"Dong, L., Chen, K.: Cryptographic Protocol Security Analysis Based on Trusted Freshness. Springer-Verlag, Heidelberg (2012)"},{"issue":"2","key":"38_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"38_CR5","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-662-44893-9_14","volume-title":"Cryptography and Security Systems","author":"I Fray El","year":"2014","unstructured":"El Fray, I., Hyla, T., Kurkowski, M., Ma\u0107k\u00f3w, W., Peja\u015b, J.: Practical authentication protocols for protecting and sharing sensitive information on mobile devices. In: Kotulski, Z., Ksi\u0119\u017copolski, B., Mazur, K. (eds.) CSS 2014. CCIS, vol. 448, pp. 153\u2013165. Springer, Heidelberg (2014)"},{"key":"38_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-33260-9_3","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2012","unstructured":"Hyla, T., Peja\u015b, J.: Certificate-based encryption scheme with general access structure. In: Cortesi, A., Chaki, N., Saeed, K., Wierzcho\u0144, S. (eds.) CISIM 2012. LNCS, vol. 7564, pp. 41\u201355. Springer, Heidelberg (2012)"},{"key":"38_CR7","unstructured":"Hyla, T., Peja\u015b, J., El Fray, I., Ma\u0107k\u00f3w, W., Chocianowicz, W., Szulga, M.: Sensitive information protection on mobile devices using general access structures. In: ICONS 2014, The Ninth International Conference on Systems, pp. 192\u2013196. IARIA (2014)"},{"key":"38_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-642-40925-7_19","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2013","unstructured":"Hyla, T., Peja\u015b, J.: A practical certificate and identity based encryption scheme and related security architecture. In: Saeed, K., Chaki, R., Cortesi, A., Wierzcho\u0144, S. (eds.) CISIM 2013. LNCS, vol. 8104, pp. 190\u2013205. Springer, Heidelberg (2013)"},{"key":"38_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"651","DOI":"10.1007\/978-3-662-45237-0_59","volume-title":"Computer Information Systems and Industrial Management","author":"T Hyla","year":"2014","unstructured":"Hyla, T., Ma\u0107k\u00f3w, W., Peja\u015b, J.: Implicit and explicit certificates-based encryption scheme. In: Saeed, K., Sn\u00e1\u0161el, V. (eds.) CISIM 2014. LNCS, vol. 8838, pp. 651\u2013666. Springer, Heidelberg (2014)"},{"issue":"3\u20134","key":"38_CR10","first-page":"453","volume":"79","author":"M Kurkowski","year":"2007","unstructured":"Kurkowski, M., Penczek, W.: Verifying Security Protocols Modeled by Networks of Automata. Fund. Inform. 79(3\u20134), 453\u2013471 (2007)","journal-title":"Fund. Inform."},{"key":"38_CR11","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/0020-0190(94)00178-2","volume":"53","author":"CH Lim","year":"1995","unstructured":"Lim, C.H., Lee, P.J.: Several practical protocols for authentication and key exchange. Information Processing Letters 53, 91\u201396 (1995)","journal-title":"Information Processing Letters"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-55224-3_22","volume-title":"Parallel Processing and Applied Mathematics","author":"M Kurkowski","year":"2014","unstructured":"Kurkowski, M., Siedlecka-Lamch, O., Szymoniak, S., Piech, H.: Parallel bounded model checking of security protocols. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wa\u015bniewski, J. (eds.) PPAM 2013, Part I. LNCS, vol. 8384, pp. 224\u2013234. Springer, Heidelberg (2014)"},{"key":"38_CR13","unstructured":"Siedlecka-Lamch, O., Kurkowski, M., Piech, H.: A new effective approach for modeling and verification of security protocols. In: Proceedings of 21th international Workshop on Concurrency. Specification and Programming (CS&P 2012), pp. 191\u2013202. Humboldt University Press, Berlin (2012)"},{"key":"38_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-04474-8_29","volume-title":"Information Security","author":"Y-Y Chen","year":"2009","unstructured":"Chen, Y.-Y., Lee, R.B.: Hardware-assisted application-level access control. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 363\u2013378. Springer, Heidelberg (2009)"},{"key":"38_CR15","unstructured":"prEN 14890\u20131 Application Interface for smart cards used as Secure Signature Creation Devices - Part 1: Basic services (2012)"},{"key":"38_CR16","unstructured":"ISO\/IEC 11770\u20133:2008 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques (2008)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24369-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T20:03:39Z","timestamp":1568664219000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24369-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243689","9783319243696"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24369-6_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"30 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}