{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:32:58Z","timestamp":1725564778758},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213710"},{"type":"electronic","value":"9783540246558"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24655-8_90","type":"book-chapter","created":{"date-parts":[[2010,9,8]],"date-time":"2010-09-08T20:25:37Z","timestamp":1283977537000},"page":"824-833","source":"Crossref","is-referenced-by-count":4,"title":["A Verification Model for Electronic Transaction Protocols"],"prefix":"10.1007","author":[{"given":"Qingfeng","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shichao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"90_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic for Authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"unstructured":"Heintze, N., Tygar, J., Wing, J., Wong, H.: Model Checking Electronic Commerce Protocols. In: Proceeding of the 2nd USENIX Workshop on Electronic Commerce (November 1996)","key":"90_CR2"},{"doi-asserted-by":"crossref","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Tools and Algorithms for the Construction and Analysis of Systems: Second International Workshop, TACAs\u201996, pp. 147\u2013166 (March 1996)","key":"90_CR3","DOI":"10.1007\/3-540-61042-1_43"},{"unstructured":"Chen, Q., Zhang, C., Zhang, S.: ENDL: A Logical Framework for Verifying Secure Transaction Protocols. Knowledge and Information Systems, an International Journal by Springer (accepted)","key":"90_CR4"},{"key":"90_CR5","first-page":"68","volume-title":"Proceedings of the 18th National Conference on Artificial Intelligence (AAAI 2002)","author":"A. Hunter","year":"2002","unstructured":"Hunter, A.: Measuring inconsistency in knowledge via quasi-classical models. In: Proceedings of the 18th National Conference on Artificial Intelligence (AAAI 2002), pp. 68\u201373. MIT Press, Cambridge (2002)"},{"unstructured":"SET Secure Electronic Transaction Specification, Book 1: Business Description, Version 1.0, May 31 (1997)","key":"90_CR6"},{"issue":"12","key":"90_CR7","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using Encryption for Authentication in Large Networks of Computers. Comm. of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Comm. of the ACM"},{"issue":"8","key":"90_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D. Denning","year":"1981","unstructured":"Denning, D., Sacco, G.: Timestamp in Key Distribution Protocols. Communications of ACM\u00a024(8), 533\u2013536 (1981)","journal-title":"Communications of ACM"}],"container-title":["Lecture Notes in Computer Science","Advanced Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24655-8_90.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T02:58:53Z","timestamp":1620010733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24655-8_90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213710","9783540246558"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24655-8_90","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}