{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:28:26Z","timestamp":1725560906078},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540208273"},{"type":"electronic","value":"9783540245919"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24591-9_33","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T03:36:56Z","timestamp":1280374616000},"page":"442-457","source":"Crossref","is-referenced-by-count":0,"title":["Automation-Considered Logic of Authentication and Key Distribution"],"prefix":"10.1007","author":[{"given":"Taekyoung","family":"Kwon","sequence":"first","affiliation":[]},{"given":"Seongan","family":"Lim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the ACM Symposium on Principles of Distributed Computing, pp. 201\u2013216 (August 1991)","DOI":"10.1145\/112600.112618"},{"key":"33_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/3-540-49162-7_12","volume-title":"Public Key Cryptography","author":"S. Blake-Wilson","year":"1999","unstructured":"Blake-Wilson, S., Menezes, A.: Unknown key-share attacks on the stationto-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol.\u00a01560, pp. 154\u2013170. Springer, Heidelberg (1999)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","first-page":"240","volume-title":"Advances in Cryptology - EUROCRYPT \u201993","author":"C. Boyd","year":"1993","unstructured":"Boyd, C., Mao, W.: On a limitation of BAN logic. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 240\u2013247. Springer, Heidelberg (1993)"},{"key":"33_CR4","unstructured":"Boyd, C.: Towards extensional goals in authentication protocols. In: Proc. of DIMACS Workshop on Cryptographic Protocol Design and Verification (1997)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Brackin, S.: A HOL extension of GNY for automatically analyzing cryptographic protocols. In: Proc. of the IEEE Computer Security Foundation Workshop (June 1996)","DOI":"10.1109\/CSFW.1996.503691"},{"key":"33_CR6","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Technical Report SRC RR 39, Digital Equipment Corporation, Systems Research Center (February 1990)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Dekker, A.: C3PO: a tool for automatic sound cryptographic protocol analysis. In: Proc. of the IEEE Computer Security Foundation Workshop (June 2000)","DOI":"10.1109\/CSFW.2000.856927"},{"issue":"8","key":"33_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning, D., Sacco, G.: Timestamps in key distribution protocols. Communications of the ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of the ACM"},{"issue":"6","key":"33_CR9","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"33_CR10","unstructured":"Goldblatt, R.: Mathematical modal logic: a view of its evolution (February 2002), http:\/\/www.mcs.vuw.ac.nz\/rob"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: Proc. of the IEEE Symposium on Research in Security and Privacy, pp. 234\u2013248 (1990)","DOI":"10.1109\/RISP.1990.63854"},{"issue":"8","key":"33_CR12","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/S0140-3664(99)00030-4","volume":"22","author":"S. Gritzalis","year":"1999","unstructured":"Gritzalis, S., Spinellis, D., Georgiadis, P.: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications\u00a022(8), 695\u2013707 (1999)","journal-title":"Computer Communications"},{"key":"33_CR13","first-page":"93","volume":"17","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software - Concepts and Tools\u00a017, 93\u2013102 (1996)","journal-title":"Software - Concepts and Tools"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Some new attacks upon security protocols. In: IEEE Computer Security Foundations Workshop, pp. 162\u2013169 (1996)","DOI":"10.1109\/CSFW.1996.503701"},{"key":"33_CR15","unstructured":"Mao, W.: An augmentation of BAN-like logics. In: IEEE Computer Security Foundations Workshop, pp.44\u201356 (1995)"},{"issue":"1","key":"33_CR16","first-page":"370","volume":"17","author":"A. Mathuria","year":"1995","unstructured":"Mathuria, A., Safavi-Naini, R., Nickolas, P.: On the automation of GNY logic. Austrialian Computer Science Communications\u00a017(1), 370\u2013379 (1995)","journal-title":"Austrialian Computer Science Communications"},{"issue":"12","key":"33_CR17","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"issue":"2","key":"33_CR18","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/382258.382789","volume":"24","author":"D. Nessett","year":"1990","unstructured":"Nessett, D.: A critique of the BAN logic. ACM Operating Systems Review\u00a024(2), 35\u201338 (1990)","journal-title":"ACM Operating Systems Review"},{"key":"33_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL","author":"T. Nipkow","year":"2002","unstructured":"Nipkow, T., Paulson, L., Wenzel, M.: Isabelle\/HOL. LNCS, vol.\u00a02283. Springer, Heidelberg (2002)"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"van Oorschot, P.: Extending cryptographic logics of belief to key agreement protocols. In: Proc. of the ACM Conference on Computer Communications Security, pp. 232\u2013243 (1993)","DOI":"10.1145\/168588.168617"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Song, D.: Athena: a new efficient automatic checker for security protocol analysis. In: Proc. of the IEEE Computer Security Foundation Workshop, pp. 192\u2013202 (1999)","DOI":"10.1109\/CSFW.1999.779773"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Syverson, P., van Oorschot, P.: A unified cryptographic protocol logic. NRL Publication 5540\u2013227, Naval Research Lab (1996)","DOI":"10.21236\/ADA464967"},{"key":"33_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45608-2_2","volume-title":"Foundations of Security Analysis and Design","author":"P. Syverson","year":"2002","unstructured":"Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, p. 63. Springer, Heidelberg (2002)"},{"key":"33_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/3-540-61770-1_39","volume-title":"Computer Security - ESORICS 96","author":"G. Wedel","year":"1996","unstructured":"Wedel, G., Kessler, V.: Formal semantics for authentication logics. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.\u00a01146, pp. 219\u2013241. Springer, Heidelberg (1996)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24591-9_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T19:40:58Z","timestamp":1559331658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24591-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540208273","9783540245919"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24591-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}