{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T17:38:55Z","timestamp":1748367535451,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540230243"},{"type":"electronic","value":"9783540301240"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30124-0_31","type":"book-chapter","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T17:27:59Z","timestamp":1267550879000},"page":"400-414","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Complete Lax Logical Relations for Cryptographic Lambda-Calculi"],"prefix":"10.1007","author":[{"given":"Jean","family":"Goubault-Larrecq","sequence":"first","affiliation":[]},{"given":"S\u0142awomir","family":"Lasota","sequence":"additional","affiliation":[]},{"given":"David","family":"Nowak","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,9,9]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Proc. 4th ACM Conference on Computer and Communications Security, CCS 1997 (1997)","DOI":"10.1145\/266420.266432"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A bisimulation method for cryptographic protocols. Nordic Journal of Computing\u00a05(4) (1998)","DOI":"10.1007\/BFb0053560"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Alimohamed, M.: A characterization of lambda definability in categorical models of implicit polymorphism. Theoretical Computer Science\u00a0146(1\u20132) (1995)","DOI":"10.1016\/0304-3975(94)00283-O"},{"key":"31_CR4","volume-title":"Proc. LICS 1999","author":"M. Boreale","year":"1999","unstructured":"Boreale, M., de Nicola, R., Pugliese, R.: Proof techniques for cryptographic processes. In: Proc. LICS 1999. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"31_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45719-4_20","volume-title":"Algebraic Methodology and Software Technology","author":"J. Borgstr\u00f6m","year":"2002","unstructured":"Borgstr\u00f6m, J., Nestmann, U.: On bisimulations for the spi calculus. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol.\u00a02422. Springer, Heidelberg (2002)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Comon, H., Shmatikov, V.: Is it possible to decide whether a cryptographic protocol is secure or not? J. of Telecommunications and Information Technology\u00a04 (2002)","DOI":"10.26636\/jtit.2002.4.149"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory, IT\u00a029(2) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"31_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/3-540-45793-3_37","volume-title":"Computer Science Logic","author":"J. Goubault-Larrecq","year":"2002","unstructured":"Goubault-Larrecq, J., Lasota, S., Nowak, D.: Logical relations for monadic types. In: Bradfield, J.C. (ed.) CSL 2002 and EACSL 2002. LNCS, vol.\u00a02471, p. 553. Springer, Heidelberg (2002)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Goubault-Larrecq, J., Lasota, S., Nowak, D., Zhang, Y.: Complete lax logical relations for cryptographic lambda-calculi. Research Report, LSV, ENS de Cachan (2004)","DOI":"10.1007\/978-3-540-30124-0_31"},{"key":"31_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48168-0_38","volume-title":"Computer Science Logic","author":"F. Honsell","year":"1999","unstructured":"Honsell, F., Sannella, D.: Pre-logical relations. In: Flum, J., Rodr\u00edguez-Artalejo, M. (eds.) CSL 1999. LNCS, vol.\u00a01683. Springer, Heidelberg (1999)"},{"key":"31_CR11","series-title":"Cambridge Studies in Advanced Mathematics","volume-title":"Introduction to Higher Order Categorical Logic","author":"J. Lambek","year":"1986","unstructured":"Lambek, J., Scott, P.J.: Introduction to Higher Order Categorical Logic. Cambridge Studies in Advanced Mathematics, vol.\u00a07. Cambridge University Press, Cambridge (1986)"},{"key":"31_CR12","volume-title":"Foundations for Programming Languages","author":"J.C. Mitchell","year":"1985","unstructured":"Mitchell, J.C.: Foundations for Programming Languages. MIT Press, Cambridge (1985)"},{"key":"31_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56992-8_21","volume-title":"Computer Science Logic","author":"J.C. Mitchell","year":"1993","unstructured":"Mitchell, J.C., Scedrov, A.: Notes on sconing and relators. In: Martini, S., B\u00f6rger, E., Kleine B\u00fcning, H., J\u00e4ger, G., Richter, M.M. (eds.) CSL 1992. LNCS, vol.\u00a0702. Springer, Heidelberg (1993)"},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Moggi, E.: Notions of computation and monads. Information and Computation\u00a093 (1991)","DOI":"10.1016\/0890-5401(91)90052-4"},{"key":"31_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-57182-5_8","volume-title":"Mathematical Foundations of Computer Science 1993","author":"A. Pitts","year":"1993","unstructured":"Pitts, A., Stark, I.: Observable properties of higher order functions that dynamically create local names, or: What\u2019s. In: Borzyszkowski, A.M., Sokolowski, S. (eds.) MFCS 1993. LNCS, vol.\u00a0711. Springer, Heidelberg (1993)"},{"key":"31_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45022-X_9","volume-title":"Automata, Languages and Programming","author":"G.D. Plotkin","year":"2000","unstructured":"Plotkin, G.D., Power, J., Sannella, D., Tennent, R.D.: Lax logical relations. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol.\u00a01853. Springer, Heidelberg (2000)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"Stark, I.: Categorical models for local names. Lisp and Symbolic Computation\u00a09(1) (1996)","DOI":"10.1007\/BF01806033"},{"key":"31_CR18","volume-title":"Proc. CSFW-14","author":"E. Sumii","year":"2001","unstructured":"Sumii, E., Pierce, B.C.: Logical relations for encryption. In: Proc. CSFW-14. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"31_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45220-1_48","volume-title":"Computer Science Logic","author":"Y. Zhang","year":"2003","unstructured":"Zhang, Y., Nowak, D.: Logical relations for dynamic name creation. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, vol.\u00a02803. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Computer Science Logic"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30124-0_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,18]],"date-time":"2025-02-18T23:00:55Z","timestamp":1739919655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30124-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540230243","9783540301240"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30124-0_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]},"assertion":[{"value":"9 September 2004","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}