{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:29:43Z","timestamp":1742956183278,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231691"},{"type":"electronic","value":"9783540302339"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30233-9_6","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T12:06:08Z","timestamp":1287921968000},"page":"72-85","source":"Crossref","is-referenced-by-count":3,"title":["A Construction Kit for Modeling the Security of M-commerce Applications"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Haneberg","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Reif","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Stenzel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0015258","volume-title":"Computer Science Today","author":"R. Anderson","year":"1995","unstructured":"Anderson, R., Needham, R.: Programming satan\u2019s computer. In: van Leeuwen, J. (ed.) Computer Science Today. LNCS, vol.\u00a01000, Springer, Heidelberg (1995)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1) (February 1990)","DOI":"10.1145\/77648.77649"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/3-540-46428-X_25","volume-title":"Fundamental Approaches to Software Engineering","author":"M. Balser","year":"2000","unstructured":"Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) FASE 2000. LNCS, vol.\u00a01783, pp. 363\u2013366. Springer, Heidelberg (2000)"},{"key":"6_CR4","first-page":"350","volume-title":"Proc. 22th IEEE Symposium on Foundations of Computer Science","author":"D. Dolev","year":"1981","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proc. 22th IEEE Symposium on Foundations of Computer Science, pp. 350\u2013357. IEEE, Los Alamitos (1981)"},{"key":"6_CR5","unstructured":"EMVCo, L. E.: 4.0 Specifications Book 1 \u2013 Application independent ICC to Terminal Interface requirements (December 2000), \n                    \n                      http:\/\/www.emvco.com\/documents\/specification\/view\/book1.pdf"},{"key":"6_CR6","unstructured":"Freier, A.O., Karlton, P., Kocher, P.C.: The SSL Protocol Version 3.0. Netscape Communications (November 1996), \n                    \n                      http:\/\/wp.netscape.com\/eng\/ssl3\/"},{"key":"6_CR7","volume-title":"Specification of Abstract Data Types","author":"J. Loeckx","year":"1996","unstructured":"Loeckx, J., Ehrich, H., Wolf, M.: Specification of Abstract Data Types. Wiley-Teubner, Chichester (1996)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communication\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"6_CR10","unstructured":"The Object Management Group (OMG). OMG Unified Modeling Language Specification Version 1.5 (2003), \n                    \n                      http:\/\/www.omg.org\/technology\/documents\/formal\/uml.htm"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Applying Formal Methods: Testing, Performance, and M\/E-Commerce"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30233-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T18:33:11Z","timestamp":1553365991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30233-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231691","9783540302339"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30233-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}