{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:10:04Z","timestamp":1763017804756,"version":"3.37.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319668444"},{"type":"electronic","value":"9783319668451"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66845-1_28","type":"book-chapter","created":{"date-parts":[[2017,8,26]],"date-time":"2017-08-26T11:37:20Z","timestamp":1503747440000},"page":"422-436","source":"Crossref","is-referenced-by-count":3,"title":["Verification of STAR-Vote and Evaluation of FDR and ProVerif"],"prefix":"10.1007","author":[{"given":"Murat","family":"Moran","sequence":"first","affiliation":[]},{"given":"Dan S.","family":"Wallach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,27]]},"reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A Armando","year":"2005","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005). doi: 10.1007\/11513988_27"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: CSF (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"28_CR3","unstructured":"Benaloh, J.: Simple verifiable elections. In: Proceedings of the USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT 2006), Vancouver, B.C., Canada, June 2006"},{"key":"28_CR4","unstructured":"Benaloh, J., Byrne, M., Kortum, P.T., McBurnett, N., Pereira, O., Stark, P.B., Wallach, D.S.: STAR-Vote: a secure, transparent, auditable, and reliable voting system. CoRR, abs\/1211.1904 (2012)"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Blanchet, B., Smyth, B.: Automated reasoning for equivalences in the applied pi calculus with barriers. In: CSF (2016)","DOI":"10.1109\/CSF.2016.29"},{"key":"28_CR6","unstructured":"Boichut, Y., Heam, P.C., Kouchnarenko, O., Oehl, F.: Improvements on the Genet and Klay technique to automatically verify security protocols. In: Workshop on Automated Verification of Infinite States Systems (2004)"},{"key":"28_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-28869-2_6","volume-title":"Programming Languages and Systems","author":"R Chadha","year":"2012","unstructured":"Chadha, R., Ciob\u00e2c\u0103, \u015e., Kremer, S.: Automated verification of equivalence properties of cryptographic protocols. In: Seidl, H. (ed.) ESOP 2012. LNCS, vol. 7211, pp. 108\u2013127. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-28869-2_6"},{"key":"28_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-662-46666-7_8","volume-title":"Principles of Security and Trust","author":"T Chothia","year":"2015","unstructured":"Chothia, T., Smyth, B., Staite, C.: Automatically checking commitment protocols in ProVerif without false attacks. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 137\u2013155. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46666-7_8"},{"key":"28_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-662-46666-7_16","volume-title":"Principles of Security and Trust","author":"V Cortier","year":"2015","unstructured":"Cortier, V., Eigner, F., Kremer, S., Maffei, M., Wiedling, C.: Type-based verification of electronic voting protocols. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 303\u2013323. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46666-7_16"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"CJF Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The scyther tool: verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414\u2013418. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-70545-1_38"},{"key":"28_CR11","doi-asserted-by":"crossref","unstructured":"Cremers, C.J.F., Lafourcade, P., Nadeau, P.: Comparing state spaces in automatic security protocol analysis. In: Formal to Practical Security - Papers Issued from the 2005\u20132008 French-Japanese Collaboration (2009)","DOI":"10.1007\/978-3-642-02002-5_5"},{"issue":"10","key":"28_CR12","doi-asserted-by":"crossref","first-page":"779","DOI":"10.4236\/ijcns.2010.310104","volume":"3","author":"N Dalal","year":"2010","unstructured":"Dalal, N., Shah, J., Hisaria, K., Jinwala, D.: A comparative analysis of tools for verification of security protocols. IJCNS 3(10), 779\u2013787 (2010)","journal-title":"IJCNS"},{"issue":"4","key":"28_CR13","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3233\/JCS-2009-0340","volume":"17","author":"S Delaune","year":"2009","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Verifying privacy-type properties of electronic voting protocols. J. Comput. Secur. 17(4), 435\u2013487 (2009)","journal-title":"J. Comput. Secur."},{"issue":"2","key":"28_CR14","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198\u2013207 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-642-32759-9_19","volume-title":"FM 2012: Formal Methods","author":"J Heather","year":"2012","unstructured":"Heather, J., Schneider, S.: A formal framework for modelling coercion resistance and receipt freeness. In: Giannakopoulou, D., M\u00e9ry, D. (eds.) FM 2012. LNCS, vol. 7436, pp. 217\u2013231. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-32759-9_19"},{"key":"28_CR16","doi-asserted-by":"crossref","unstructured":"Hussain, M., Seret, D.: A comparative study of security protocols validation tools: hermes vs. avispa. In: 2006 8th International Conference Advanced Communication Technology, vol. 1, pp. 303\u2013308, 6 pages, February 2006","DOI":"10.1109\/ICACT.2006.205974"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Lafourcade, P., Puys, M.: Performance evaluations of cryptographic protocols verification tools dealing with algebraic properties. In: Foundations and Practice of Security (FPS 2015), Clermont-Ferrand, France, October 2015","DOI":"10.1007\/978-3-319-30303-1_9"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-12459-4_13","volume-title":"Formal Aspects in Security and Trust","author":"P Lafourcade","year":"2010","unstructured":"Lafourcade, P., Terrade, V., Vigier, S.: Comparison of cryptographic verification tools dealing with algebraic properties. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 173\u2013185. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-12459-4_13"},{"issue":"3","key":"28_CR19","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131\u2013133 (1995)","journal-title":"Inf. Process. Lett."},{"key":"28_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-61770-1_46","volume-title":"Computer Security \u2014 ESORICS 96","author":"CA Meadows","year":"1996","unstructured":"Meadows, C.A.: Analyzing the needham-schroeder public key protocol: a comparison of two approaches. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 351\u2013364. Springer, Heidelberg (1996). doi: 10.1007\/3-540-61770-1_46"},{"key":"28_CR21","unstructured":"Moran, M., Heather, J.: Automated analysis of voting systems with dolev-yao intruder model. In: AVOCS 2013, September 2013"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Moran, M., Heather, J., Schneider, S.: Verifying anonymity in voting systems using CSP. Formal Aspects Comput., 1\u201336 (2012)","DOI":"10.1007\/s00165-012-0268-x"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), December 1978","DOI":"10.1145\/359657.359659"},{"key":"28_CR24","unstructured":"Smyth, B.: Formal verification of cryptographic protocols with automated reasoning. Ph.D. thesis, School of Computer Science, University of Birmingham (2011)"}],"container-title":["Lecture Notes in Computer Science","Integrated Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66845-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T16:51:58Z","timestamp":1570035118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66845-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319668444","9783319668451"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66845-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}