{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:14:52Z","timestamp":1747282492139,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491080"},{"type":"electronic","value":"9783319491097"}],"license":[{"start":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:00:00Z","timestamp":1477094400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-49109-7_90","type":"book-chapter","created":{"date-parts":[[2016,10,21]],"date-time":"2016-10-21T05:03:15Z","timestamp":1477026195000},"page":"925-934","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis of OpenID Connect Protocol with Cryptoverif in the Computational Model"],"prefix":"10.1007","author":[{"given":"Jinli","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jintian","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhongyu","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,22]]},"reference":[{"key":"90_CR1","unstructured":"Sakimura N, Bradley J, Jones M, et al. OpenID Connect Core 1.0. (2014-11-08). http:\/\/openid.net\/specs\/openid-connect-core-1_0.html"},{"key":"90_CR2","unstructured":"Hardt D. The OAuth 2.0 Authorization Framework. IETF. RFC 6749. http:\/\/tools.ietf.org\/html\/rfc6749"},{"key":"90_CR3","doi-asserted-by":"crossref","unstructured":"Siriwardena P. Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE. Apress Media, 2014:181-200","DOI":"10.1007\/978-1-4302-6817-8"},{"key":"90_CR4","unstructured":"Mladenov V, Mainka C, Krautwald J, et al. On the security of modern Single Sign-On Protocols \u2013 OpenID Connect 1.0. eprint arXiv,2015"},{"key":"90_CR5","unstructured":"Xue R, Lei X F. Security Protocol: The soul of information security \u2013 The latest research and development of the analysis of security protocol. Proceedings of the Chinese academy of sciences, 2011, 26(3):287-296"},{"key":"90_CR6","doi-asserted-by":"publisher","unstructured":"Alireza P S, Joao P S. Authentication, authorization and auditing for ubiquitous computing: a survey and vision. DOI: 10.1504\/IJSSC.2011.039107:59-67","DOI":"10.1504\/IJSSC.2011.039107:59-67"},{"key":"90_CR7","doi-asserted-by":"publisher","unstructured":"Xiaoping C, Stephane M. Formally testing the protocol performances. DOI: 10.1504\/IJSSC.2015.069197:76-88","DOI":"10.1504\/IJSSC.2015.069197:76-88"},{"key":"90_CR8","doi-asserted-by":"crossref","unstructured":"Xi S, ZhengTao J, MeiRong Z, Yumin W. Versatile identity-based signatures for authentication in multi-user settings. http:\/\/dx.doi.org\/10.1504\/IJGUC.2014.062905","DOI":"10.1504\/IJGUC.2014.062905"},{"key":"90_CR9","doi-asserted-by":"crossref","unstructured":"Yan R, Hongbin W, Jiali D, Liqiong M. Code-based authentication with designated verifier. http:\/\/dx.doi.org\/10.1504\/IJGUC.2016.073779","DOI":"10.1504\/IJGUC.2016.073779"},{"key":"90_CR10","doi-asserted-by":"publisher","unstructured":"Danai C, Christopher M. Security challenges in the internet of things. DOI: 10.1504\/IJSSC.2015.070945:141-149","DOI":"10.1504\/IJSSC.2015.070945:141-149"},{"key":"90_CR11","doi-asserted-by":"crossref","unstructured":"Fett D, K\u00fcsters R, Schmitz G. A Comprehensive Formal Security Analysis of OAuth 2.0, eprint arXiv, 2016","DOI":"10.1145\/2976749.2978385"},{"key":"90_CR12","doi-asserted-by":"crossref","unstructured":"Li W P, Mitchell C J. Addressing threats to real-world identity management systems, ISSE 2015:251-259","DOI":"10.1007\/978-3-658-10934-9_21"},{"key":"90_CR13","doi-asserted-by":"crossref","unstructured":"Li W P, Mitchell C J. Analysing the Security of Google\u2019s implementation of OpenID Connect. eprint arXiv, 2015","DOI":"10.1007\/978-3-319-40667-1_18"},{"key":"90_CR14","unstructured":"Mainka C, Mladenov V, Schwenk J. On the security of modern Single Sign-On Protocols \u2013 Second-Order Vulnerabilities in OpenID Connect, eprint arXiv, 2016"},{"key":"90_CR15","doi-asserted-by":"crossref","unstructured":"Blanchet B. A Computationally Sound Mechanized Prover for Security Protocols. IEEE Symposium on Security&Privacy, Oakland, California, May 2006. 140-154","DOI":"10.1109\/SP.2006.1"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49109-7_90","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:02:27Z","timestamp":1568484147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49109-7_90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,22]]},"ISBN":["9783319491080","9783319491097"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49109-7_90","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2016,10,22]]}}}