{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:47:35Z","timestamp":1765486055281,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319479576"},{"type":"electronic","value":"9783319479583"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47958-3_5","type":"book-chapter","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T13:40:52Z","timestamp":1475934052000},"page":"87-95","source":"Crossref","is-referenced-by-count":9,"title":["SPEC: An Equivalence Checker for Security Protocols"],"prefix":"10.1007","author":[{"given":"Alwen","family":"Tiu","sequence":"first","affiliation":[]},{"given":"Nam","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Ross","family":"Horne","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,9]]},"reference":[{"issue":"1","key":"5_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/inco.1998.2740","volume":"148","author":"M Abadi","year":"1999","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. Inf. Comput. 148(1), 1\u201370 (1999)","journal-title":"Inf. Comput."},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/978-3-540-73595-3_28","volume-title":"Automated Deduction \u2013 CADE-21","author":"D Baelde","year":"2007","unstructured":"Baelde, D., Gacek, A., Miller, D., Nadathur, G., Tiu, A.F.: The Bedwyr system for model checking over syntactic expressions. In: Pfenning, F. (ed.) CADE 2007. LNCS (LNAI), vol. 4603, pp. 391\u2013397. Springer, Heidelberg (2007)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jlap.2007.06.002","volume":"75","author":"B Blanchet","year":"2008","unstructured":"Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. J. Log. Algebr. Program. 75(1), 3\u201351 (2008)","journal-title":"J. Log. Algebr. Program."},{"key":"5_CR4","unstructured":"Borgstr\u00f6m, J.: Equivalences and calculi for formal verification of cryptographic protocols. Ph.D. thesis, \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (2008)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-540-28644-8_11","volume-title":"CONCUR 2004 - Concurrency Theory","author":"J Borgstr\u00f6m","year":"2004","unstructured":"Borgstr\u00f6m, J., Briais, S., Nestmann, U.: Symbolic bisimulation in the spi calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 161\u2013176. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28644-8_11"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Chadha, R., Ciob\u00e2c\u0103, V., Kremer, S.: Automated verification of equivalence properties of cryptographic protocols. In: Programming Languages and Systems, pp. 108\u2013127 (2012)","DOI":"10.1007\/978-3-642-28869-2_6"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signature system. In: Advances in Cryptology, Proceedings of CRYPTO 1983, Santa Barbara, California, USA, 21\u201324 August 1983, p. 153. Plenum Press, New York (1984)","DOI":"10.1007\/978-1-4684-4730-9_14"},{"key":"5_CR8","unstructured":"Cheval, V.: Automatic verification of cryptographic protocols: privacy-type properties. Ph.D. thesis, ENS Cachan, December 2012"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1007\/978-3-642-54862-8_50","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"V Cheval","year":"2014","unstructured":"Cheval, V.: APTE: an algorithm for proving trace equivalence. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014 (ETAPS). LNCS, vol. 8413, pp. 587\u2013592. Springer, Heidelberg (2014)"},{"issue":"2","key":"5_CR10","doi-asserted-by":"publisher","first-page":"9:1","DOI":"10.1145\/1656242.1656244","volume":"11","author":"H Comon-Lundh","year":"2010","unstructured":"Comon-Lundh, H., Cortier, V., Zalinescu, E.: Deciding security properties for cryptographic protocols. Application to key cycles. ACM Trans. Comput. Log. 11(2), 9:1\u20139:42 (2010). doi: 10.1145\/1656242.1656244","journal-title":"ACM Trans. Comput. Log."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, Part II. In: Information and Computation, pp. 41\u201377 (1992)","DOI":"10.1016\/0890-5401(92)90009-5"},{"issue":"2","key":"5_CR12","doi-asserted-by":"crossref","first-page":"171","DOI":"10.3233\/FI-1992-16206","volume":"16","author":"U Montanari","year":"1992","unstructured":"Montanari, U., Sassone, V.: Dynamic congruence vs. progressing bisimulation for CCS. Fundamenta Informaticae 16(2), 171\u2013199 (1992)","journal-title":"Fundamenta Informaticae"},{"issue":"1","key":"5_CR13","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s002360050036","volume":"33","author":"D Sangiorgi","year":"1996","unstructured":"Sangiorgi, D.: A theory of bisimulation for the pi-calculus. Acta Inf. 33(1), 69\u201397 (1996)","journal-title":"Acta Inf."},{"key":"5_CR14","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1017\/S0960129598002527","volume":"8","author":"D Sangiorgi","year":"1998","unstructured":"Sangiorgi, D.: On the bisimulation proof method. Math. Struct. Comput. Sci. 8, 447\u2013479 (1998)","journal-title":"Math. Struct. Comput. Sci."},{"key":"5_CR15","doi-asserted-by":"crossref","DOI":"10.1017\/9781316134924","volume-title":"$$\\pi $$ -Calculus: A Theory of Mobile Processes","author":"D Sangiorgi","year":"2001","unstructured":"Sangiorgi, D., Walker, D.: $$\\pi $$ -Calculus: A Theory of Mobile Processes. Cambridge University Press, Cambridge (2001)"},{"key":"5_CR16","unstructured":"Tiu, A.: A logical framework for reasoning about logical specifications. Ph.D. thesis, Pennsylvania State University, May 2004"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1007\/978-3-540-76637-7_25","volume-title":"Programming Languages and Systems","author":"AF Tiu","year":"2007","unstructured":"Tiu, A.F.: A trace based bisimulation for the spi calculus: an extended abstract. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol. 4807, pp. 367\u2013382. Springer, Heidelberg (2007)"},{"key":"5_CR18","unstructured":"Tiu, A.: A trace based bisimulation for the spi calculus. CoRR, abs\/0901.2166 (2009)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Tiu, A., Dawson, J.E.: Automating open bisimulation checking for the spi calculus. In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium (CSF 2010), pp. 307\u2013321. IEEE Computer Society (2010)","DOI":"10.1109\/CSF.2010.28"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47958-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T03:42:11Z","timestamp":1749613331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47958-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319479576","9783319479583"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47958-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}