{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T22:10:03Z","timestamp":1749766203467,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319504711"},{"type":"electronic","value":"9783319504728"}],"license":[{"start":{"date-parts":[[2016,11,26]],"date-time":"2016-11-26T00:00:00Z","timestamp":1480118400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-50472-8_13","type":"book-chapter","created":{"date-parts":[[2016,11,25]],"date-time":"2016-11-25T16:17:15Z","timestamp":1480090635000},"page":"159-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Analyzing Protocol Security Through Information-Flow Control"],"prefix":"10.1007","author":[{"given":"N. V.","family":"Narendra Kumar","sequence":"first","affiliation":[]},{"given":"R. K.","family":"Shyamasundar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,26]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M Abadi","year":"1996","unstructured":"Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Trans. Softw. Eng. 22(1), 6\u201315 (1996). http:\/\/dx.doi.org\/10.1109\/32.481513","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR2","unstructured":"Abadi, M.: Security protocols and their properties. In: Foundations of Secure Computation, NATO Science Series, pp. 39\u201360. IOS Press (2000)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-44750-4_19","volume-title":"Advances in Cryptology \u2014 CRYPT0 1995","author":"R Anderson","year":"1995","unstructured":"Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236\u2013247. Springer, Heidelberg (1995). doi: 10.1007\/3-540-44750-4_19 . http:\/\/dl.acm.org\/citation.cfm?id=646760.706015"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Aura, T.: Strategies against replay attacks. In: Proceedings of the 10th Computer Security Foundations Workshop, 1997, pp. 59\u201368, June 1997","DOI":"10.1109\/CSFW.1997.596787"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology \u2014 CRYPTO 1998","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1\u201312. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055716 . http:\/\/dl.acm.org\/citation.cfm?id=646763.706320"},{"issue":"4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1137\/0213053","volume":"13","author":"M Blum","year":"1984","unstructured":"Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. Comput. 13(4), 850\u2013864 (1984). http:\/\/dx.doi.org\/10.1137\/0213053","journal-title":"SIAM J. Comput."},{"key":"13_CR7","unstructured":"Bond, M., Choudary, O., Murdoch, S.J., Skorobogatov, S.P., Anderson, R.J.: Chip and skim: cloning EMV cards with the pre-play attack. CoRR abs\/1209.2531 (2012)"},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990). http:\/\/doi.acm.org\/10.1145\/77648.77649","journal-title":"ACM Trans. Comput. Syst."},{"issue":"12","key":"13_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.tcs.2006.08.040","volume":"367","author":"F Butler","year":"2006","unstructured":"Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A., Walstad, C.: Formalanalysis of Kerberos 5. Theor. Comput. Sci. 367(12), 57\u201387 (2006). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397506005743 , Automated Reasoning for Security Protocol Analysis","journal-title":"Theor. Comput. Sci."},{"key":"13_CR10","unstructured":"DeMillo, R.A., Lynch, N.A., Merritt, M.J.: Cryptographic protocols. In: Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, STOC 1982, pp. 383\u2013400. ACM, New York (1982) http:\/\/doi.acm.org\/10.1145\/800070.802214"},{"issue":"5","key":"13_CR11","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"issue":"8","key":"13_CR12","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"DE Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Commun. ACM 24(8), 533\u2013536 (1981). http:\/\/doi.acm.org\/10.1145\/358722.358740","journal-title":"Commun. ACM"},{"issue":"2","key":"13_CR13","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013208 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"13_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131\u2013133 (1995). http:\/\/dx.doi.org\/10.1016\/0020-0190(95)00144-2","journal-title":"Inf. Process. Lett."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Murdoch, S., Drimer, S., Anderson, R., Bond, M.: Chip and pin is broken. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 433\u2013446, May 2010","DOI":"10.1109\/SP.2010.33"},{"issue":"12","key":"13_CR16","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978). http:\/\/doi.acm.org\/10.1145\/359657.359659","journal-title":"Commun. ACM"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Narendra Kumar, N.V., Shyamasundar, R.K.: Realizing purpose-based privacy policies succinctly via information-flow labels. In: 4th IEEE BDCloud, pp. 753\u2013760. IEEE (2014)","DOI":"10.1109\/BDCloud.2014.89"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Narendra Kumar, N.V., Shyamasundar, R.K.: POSTER: dynamic labelling for analyzing security protocols. In: 22nd ACM CCS, pp. 1665\u20131667 (2015)","DOI":"10.1145\/2810103.2810113"},{"key":"13_CR19","unstructured":"Roscoe, A.W.: Intensional specifications of security protocols. In: Proceedings of the 9th IEEE Computer Security Foundations Workshop, 1996, pp. 28\u201338, June 1996"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Limitations on design principles for public key protocols. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996, pp. 62\u201372, May 1996","DOI":"10.21236\/ADA465132"},{"key":"13_CR21","unstructured":"Wagner, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: Proceedings of the 2nd Conference on Proceedings of the Second USENIX Workshop on Electronic Commerce, vol. 2. WOEC 1996 (1996)"},{"issue":"3","key":"13_CR22","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/182110.182113","volume":"28","author":"TYC Woo","year":"1994","unstructured":"Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. SIGOPS Oper. Syst. Rev. 28(3), 24\u201337 (1994). http:\/\/doi.acm.org\/10.1145\/182110.182113","journal-title":"SIGOPS Oper. Syst. Rev."}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-50472-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T21:39:28Z","timestamp":1749764368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-50472-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,26]]},"ISBN":["9783319504711","9783319504728"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-50472-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,11,26]]},"assertion":[{"value":"26 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Internet Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 January 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icdcit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}