{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:14:49Z","timestamp":1761621289272,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_20","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T09:03:15Z","timestamp":1477040595000},"page":"209-220","source":"Crossref","is-referenced-by-count":6,"title":["Automatic Verification of Security of OpenID Connect Protocol with ProVerif"],"prefix":"10.1007","author":[{"given":"Jintian","family":"Lu","sequence":"first","affiliation":[]},{"given":"Jinli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhongyu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"20_CR1","unstructured":"Ronak R.Patel,Bhavesh O.Enhance OpenID Protocol in identity Management.International Journal of Application or Innovation in Engineering &Management.Vol.2,No.4,Apr. 2013: 248-252"},{"key":"20_CR2","unstructured":"Nat S., John B., Michael J.,Breno D M.,Mortimore C.. OpenID Connect Core 1.0, 2014. http:\/\/OpenID.net\/specs\/OpenID-connect-core-1_0.html ."},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Dick Hardt. The OAuth 2.0 authorization framework. October 2012. http:\/\/tools.ietf.org\/html\/rfc6749 .","DOI":"10.17487\/rfc6749"},{"key":"20_CR4","unstructured":"David R.,Brad F. . OpenID Authentication 2.0 - Final, 2007. http:\/\/OpenID.net\/specs\/OpenID-authentication-2_0.html"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Alireza P S., Joao P S. Authentication, authorization and auditing for ubiquitous computing: a survey and vision. International Journal of Space-Based and Situated Computing.Vol.1 No.1,2011:59-67","DOI":"10.1504\/IJSSC.2011.039107"},{"key":"20_CR6","unstructured":"Google OpenID Connect 1.0, 2015. https:\/\/developers.google.com\/accounts\/docs\/OpenIDConnect ."},{"key":"20_CR7","unstructured":"Microsoft OpenID Connect, 2014. https:\/\/msdn.microsoft.com\/en-us\/library\/azure\/dn6455"},{"key":"20_CR8","unstructured":"PayPal OpenID Connect 1.0, 2014. https:\/\/developer.paypal.com\/docs\/integration\/direct\/identity\/log-in-with-paypal"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Blanchet B. Automatic proof of strong secrecy for security protocols\/\/Proceeding of the 2004 IEEE Symposium on Security and privacy,California,2004:86-100","DOI":"10.1109\/SECPRI.2004.1301317"},{"key":"20_CR10","unstructured":"Wanpeng L. and Chris J M. Analysing the Security of Google\u2019s implementation of OpenID Connect. Information Security Group, Royal Holloway, University of LondonTW20 0EX.Aug.2015:1-27"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Guangye S., Mohamed M. FASER (Formal and Automatic Security Enforcement by Rewriting) by BPA algebra with test. International Journal of Grid and Utility Computing.Vol4,No.2-3,2013:204-211","DOI":"10.1504\/IJGUC.2013.056257"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Blanchet B. An efficient cryptographic protocol verifier based on prolog rules\/\/Proceeding of the 14th IEEE Computer Security Foundations Workshop, Cape Breton,2011:82-96","DOI":"10.1109\/CSFW.2001.930138"},{"key":"20_CR13","unstructured":"OpenID Connect Core 1.0 incorporating errata set 1. http:\/\/OpenID.net\/specs\/OpenID-connect-core-1_0.html#toc"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Terry B., Brian L., Thomas S., John S.,Gautam K.. An example of the use of Public Health Grid (PHGrid) technology during the 2009 H1N1 influenza pandemic. International Journal of Grid and Utility Computing.Vol.4,No.2-3,(2013):148-155","DOI":"10.1504\/IJGUC.2011.040602"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Abadi M.,Fournet C.Mobile values,new names, and secure communication\/\/Proceeding of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages,London,2001:104-115","DOI":"10.1145\/360204.360213"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Alessandro B. Gerardo. Federico T. Secure and efficient design of software block cipher implementations on microcontrollers. International Journal of Grid and Utility Computing.vol.4,No.2-3,2013:110-118","DOI":"10.1504\/IJGUC.2013.056246"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"N. Bharadiya B.,Soumyadev M., R.C. Hansdah. An authentication protocol for vehicular ad hoc networks with heterogeneous anonymity requirements. International Journal of Space-Based and Situated Computing.Vol.4,No.1,2014:1-14","DOI":"10.1504\/IJSSC.2014.060684"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"David M.,Herve G. Security in wireless sensor networks: a survey of attacks and countermeasures. International Journal of Space-Based and Situated Computing.Vol.1,No.2-3,2011:151-162","DOI":"10.1504\/IJSSC.2011.040341"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T19:00:27Z","timestamp":1749668427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_20","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}