{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:45:29Z","timestamp":1725561929303},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540212997"},{"type":"electronic","value":"9783540247302"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24730-2_27","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T15:00:15Z","timestamp":1280761215000},"page":"342-356","source":"Crossref","is-referenced-by-count":23,"title":["Automatic Verification of Time Sensitive Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Giorgio","family":"Delzanno","sequence":"first","affiliation":[]},{"given":"Pierre","family":"Ganty","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/BFb0015258","volume-title":"Computer Science Today","author":"R. Anderson","year":"1995","unstructured":"Anderson, R., Needham, R.: Programming Satan\u2019s computer. In: van Leeuwen, J. (ed.) Computer Science Today. LNCS, vol.\u00a01000, pp. 426\u2013440. Springer, Heidelberg (1995)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Bella","year":"1998","unstructured":"Bella, G., Paulson, L.C.: Kerberos version IV: inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 361\u2013375. Springer, Heidelberg (1998)"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. on Computer Systems"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW 2001, pp. 82\u201396 (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-46002-0_16","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Bozzano","year":"2002","unstructured":"Bozzano, M., Delzanno, G.: Beyond Parameterized Verification. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 221\u2013235. Springer, Heidelberg (2002)"},{"key":"27_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-36577-X_22","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L. Bozga","year":"2003","unstructured":"Bozga, L., Lakhnech, Y., P\u00e9rin, M.: Pattern-based Abstraction for Verifying Secrecy in Protocols. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 299\u2013314. Springer, Heidelberg (2003)"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: A meta-notation for Protocol Analysis. In: CSFW 1999, pp. 55\u201369 (1999)","DOI":"10.1109\/CSFW.1999.779762"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Cohen, E.: TAPS: A First-Order Verifier for Cryptographic Protocols. In: CSFW 2000, pp. 144\u2013158 (2000)","DOI":"10.1109\/CSFW.2000.856933"},{"key":"27_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/10722599_14","volume-title":"Computer Security - ESORICS 2000","author":"N. Evans","year":"2000","unstructured":"Evans, N., Schneider, S.: Analysing Time Dependent Security Properties in CSP Using PVS. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 222\u2013237. Springer, Heidelberg (2000)"},{"key":"27_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/10721959_21","volume-title":"Automated Deduction - CADE-17","author":"T. Genet","year":"2000","unstructured":"Genet, T., Klay, F.: Rewriting for Cryptographic Protocol Verification. In: McAllester, D. (ed.) CADE 2000. LNCS, vol.\u00a01831, pp. 271\u2013290. Springer, Heidelberg (2000)"},{"key":"27_CR11","unstructured":"Lowe, G.: A Family of Attacks upon Authentication Protocols. Technical Report 1997\/5, University of Leicester (1997)"},{"key":"27_CR12","doi-asserted-by":"crossref","unstructured":"Lowe, G.: A Hierarchy of Authentication Specifications. In: CSFW 1997, pp. 31\u201344 (1997)","DOI":"10.1109\/CSFW.1997.596782"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. In: CSFW 1997, pp. 18\u201330 (1997)","DOI":"10.1109\/CSFW.1997.596779"},{"issue":"2-3","key":"27_CR14","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3233\/JCS-1999-72-302","volume":"7","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Towards a completeness result for model checking of security protocols. J. of Computer Security\u00a07(2-3), 89\u2013146 (1998)","journal-title":"J. of Computer Security"},{"issue":"4","key":"27_CR15","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1145\/363516.363528","volume":"9","author":"W. Marrero","year":"2000","unstructured":"Marrero, W., Clarke, E., Jha, S.: Verifying Security Protocols with Brutus. ACM Trans. Softw. Eng. Methodol.\u00a09(4), 443\u2013487 (2000)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2","key":"27_CR16","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL protocol analyzer: An overview. J. of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"J. of Logic Programming"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: CCS 2001, pp. 166\u2013175 (2001)","DOI":"10.1145\/501983.502007"},{"issue":"2,3","key":"27_CR18","doi-asserted-by":"crossref","first-page":"147","DOI":"10.3233\/JCS-1999-72-303","volume":"7","author":"W. Roscoe","year":"1999","unstructured":"Roscoe, W., Broadfoot, P.J.: Proving Security Protocols with Model Checkers by Data Independence Techniques. J. of Computer Security\u00a07(2,3), 147\u2013190 (1999)","journal-title":"J. of Computer Security"},{"key":"27_CR19","unstructured":"Song, D.X.: Athena. A New Efficient Automatic Checker for Security Protocol Analysis. In: CSFW 1999, pp. 192\u2013202 (1999)"},{"key":"27_CR20","unstructured":"The MSR(C) home page: \n                    \n                      http:\/\/www.disi.unige.it\/person\/DelzannoG\/MSR\/"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24730-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,17]],"date-time":"2019-03-17T18:02:06Z","timestamp":1552845726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24730-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540212997","9783540247302"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24730-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}