{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:24Z","timestamp":1725560904971},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_1","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"1-15","source":"Crossref","is-referenced-by-count":0,"title":["Model Checking of Security Protocols with Pre-configuration"],"prefix":"10.1007","author":[{"given":"Kyoil","family":"Kim","sequence":"first","affiliation":[]},{"given":"Jacob A.","family":"Abraham","sequence":"additional","affiliation":[]},{"given":"Jayanta","family":"Bhadra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0 (1997), Online: \n                    \n                      http:\/\/www.cs.york.ac.uk\/jac\/papers\/drareview.ps.gz"},{"issue":"12","key":"1_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"1_CR4","unstructured":"Roscoe, A.W., Goldsmith, M.H.: The perfect \u201dspy\u201d for modelchecking cryp-toprotocols. In: Proc. of the DIMACS Workshop on Design and Formal Verification of Security Protocols (1997), Online: \n                    \n                      http:\/\/dimacs.rutgers.edu\/Workshops\/Security\/program2\/program.html"},{"key":"1_CR5","unstructured":"Mitchell, J.C., Mitchell, M., Stern, U.: Automated Analysis of Cryptographic Protocols Using Mur\u03d5. In: Proc. of IEEE Symposium on Security and Privacy, pp. 141\u2013151 (1997)"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/363516.363528","volume":"9","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Jha, S., Marrero, W.: Verifying Security Protocols with Brutus. ACM Transactions on Software Engineering and Methodology\u00a09(4), 443\u2013487 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Shmatikov, V., Stern, U.: Efficient Finite-State Analysis for Large Security Protocols. In: Proc. of the 11th IEEE Computer Security Foundations Workshop, pp. 106\u2013115 (1998)","DOI":"10.1109\/CSFW.1998.683160"},{"key":"1_CR8","unstructured":"\u201cMur\u03d5: User manual,\u201d Online: \n                    \n                      http:\/\/sprout.stanford.edu\/dill\/Murphi\/Murphi3.1.tar.Z"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T10:12:51Z","timestamp":1552817571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}