{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:04:42Z","timestamp":1725573882237},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540204619"},{"type":"electronic","value":"9783540398936"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39893-6_22","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T10:35:57Z","timestamp":1294396557000},"page":"375-395","source":"Crossref","is-referenced-by-count":2,"title":["A Z Based Approach to Verifying Security Protocols"],"prefix":"10.1007","author":[{"given":"Benjamin W.","family":"Long","sequence":"first","affiliation":[]},{"given":"Colin J.","family":"Fidge","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Cerone","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/266420.266432","volume-title":"Fourth ACM Conference on Computer and Communications Security","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Fourth ACM Conference on Computer and Communications Security, pp. 36\u201347. ACM Press, New York (1997)"},{"issue":"5","key":"22_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/JSAC.2002.806133","volume":"21","author":"G. Bella","year":"2003","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE Journal On Selected Areas In Communications\u00a021(5), 77\u201387 (2003)","journal-title":"IEEE Journal On Selected Areas In Communications"},{"issue":"5","key":"22_CR3","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/49.223872","volume":"11","author":"C. Boyd","year":"1993","unstructured":"Boyd, C.: Security architectures using formal methods. IEEE Journal On Selected Areas In Communications\u00a011(5), 694\u2013701 (1993)","journal-title":"IEEE Journal On Selected Areas In Communications"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-44456-4_16","volume-title":"Information Security","author":"C. Boyd","year":"2000","unstructured":"Boyd, C., Kearney, P.: Exploring fair exchange protocols using specification animation. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol.\u00a01975, pp. 209\u2013223. Springer, Heidelberg (2000)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Technical Report TR 39, Digital Equipment Corporation (February 1989)","DOI":"10.1145\/74850.74852"},{"issue":"1","key":"22_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s001650200025","volume":"14","author":"M. Butler","year":"2002","unstructured":"Butler, M.: On the use of data refinement in the development of secure communications systems. Formal Aspects of Computing\u00a014(1), 2\u201334 (2002)","journal-title":"Formal Aspects of Computing"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/RISP.1994.296586","volume-title":"Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy","author":"U. Carlsen","year":"1994","unstructured":"Carlsen, U.: Generating formal cryptographic protocol specifications. In: Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 137\u2013146. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"22_CR8","unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: Version 1.0 (1997), http:\/\/www.cs.york.ac.uk\/~jac\/papers\/drareviewps.ps (accessed May 2003)"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/CSFW.2000.856933","volume-title":"Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW 2000)","author":"E. Cohen","year":"2000","unstructured":"Cohen, E.: Taps: A first-order verifier for cryptographic protocols. In: Proceedings of the 13th IEEE Computer Security Foundations Workshop (CSFW 2000), pp. 144\u2013158. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/CSFW.2000.856925","volume-title":"Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW 2000)","author":"G. Denker","year":"2000","unstructured":"Denker, G., Millen, J.K., Grau, A., Filipe, J.K.: Optimizing protocol rewrite rules of CIL specifications. In: Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW 2000), pp. 52\u201363. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: Multiuser cryptographic techniques. In: Proceedings of AFIPS 1976 National Computer Conference, Montvale, New Jersey, pp. 109\u2013112 (1976)","DOI":"10.1145\/1499799.1499815"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/CSFW.1993.246633","volume-title":"Proceedings of the Computer Security Foundations Workshop VI","author":"L. Gong","year":"1993","unstructured":"Gong, L.: Variations on the themes of message freshness and replay \u2014 or the difficulty of devising formal methods to analyze cryptographic protocols. In: Proceedings of the Computer Security Foundations Workshop VI, pp. 131\u2013136. IEEE Computer Society Press, Los Alamitos (1993)"},{"issue":"4","key":"22_CR13","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1109\/49.17707","volume":"7","author":"R. Kemmerer","year":"1989","unstructured":"Kemmerer, R.: Analyzing encryption protocols using formal verification techniques. IEEE Journal On Selected Areas In Communications\u00a07(4), 448\u2013457 (1989)","journal-title":"IEEE Journal On Selected Areas In Communications"},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/CSFW.1997.596782","volume-title":"Proceedings of 10th IEEE Computer Security Foundations Workshop (CSFW 1997)","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of 10th IEEE Computer Security Foundations Workshop (CSFW 1997), pp. 31\u201343. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"22_CR16","unstructured":"Ma, L., Tsai, J.J.P.: Formal Verification Techniques for Computer Communication Security Protocols, volume 2. World Scientific Publishing Company (2001), http:\/\/www.cs.uic.edu\/~lma\/abstract1.pdf (accessed May 2003)"},{"issue":"2","key":"22_CR17","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/BFb0000430","volume-title":"Advances in Cryptology - ASIACRYPT \u201994","author":"C.A. Meadows","year":"1995","unstructured":"Meadows, C.A.: Formal verification of cryptographic protocols: A survey. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol.\u00a0917, pp. 133\u2013149. Springer, Heidelberg (1995)"},{"key":"22_CR19","series-title":"Prentice Hall International Series In Computer Science","volume-title":"Programming from Specifications","author":"C. Morgan","year":"1989","unstructured":"Morgan, C.: Programming from Specifications. Prentice Hall International Series In Computer Science. Prentice Hall International, Englewood Cliffs (1989)"},{"issue":"12","key":"22_CR20","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R. Needham","year":"1978","unstructured":"Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"22_CR21","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/CSFW.1997.596788","volume-title":"Proceedings of 10th IEEE Computer Security Foundations Workshop (CSFW 1997)","author":"L.C. Paulson","year":"1997","unstructured":"Paulson, L.C.: Proving properties of security protocols by induction. In: Proceedings of 10th IEEE Computer Security Foundations Workshop (CSFW 1997), pp. 70\u201383. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"22_CR22","volume-title":"The Modelling and Analysis of Security Protocols: The CSP Approach","author":"P. Ryan","year":"2000","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: The Modelling and Analysis of Security Protocols: The CSP Approach. Addison-Wesley, Reading (2000)"},{"key":"22_CR23","volume-title":"Proceedings of the 1996 IEEE Computer Society Symposium on Research in Security and Privacy","author":"S. Schneider","year":"1996","unstructured":"Schneider, S.: Security properties and CSP. In: Proceedings of the 1996 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"22_CR24","first-page":"106","volume-title":"Proceedings of 11th IEEE Computer Security Foundations Workshop (CSFW 1998)","author":"V. Shmatikov","year":"1998","unstructured":"Shmatikov, V., Stern, U.: Efficient finite-state analysis for large security protocols. In: Proceedings of 11th IEEE Computer Security Foundations Workshop (CSFW 1998), pp. 106\u2013115. IEEE Computer Society Press, Los Alamitos (1998)"},{"key":"22_CR25","series-title":"Prentice Hall International Series In Computer Science","volume-title":"The Z Notation : A Reference Manual","author":"J.M. Spivey","year":"1992","unstructured":"Spivey, J.M.: The Z Notation: A Reference Manual. Prentice Hall International Series In Computer Science. Prentice Hall, London (1992)"},{"issue":"3","key":"22_CR26","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1109\/32.991320","volume":"28","author":"S.G. Stubblebine","year":"2002","unstructured":"Stubblebine, S.G., Wright, R.N.: An authentication logic with formal semantics supporting synchronization, revocation, and recency. IEEE Transactions on Software Engineering\u00a028(3), 256\u2013285 (2002)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"22_CR27","first-page":"160","volume-title":"Proceedings of the 1998 IEEE Symposium on Security and Privacy","author":"F.J. Thayer","year":"1998","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, May 1998, pp. 160\u2013171. IEEE Computer Society Press, Los Alamitos (1998)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39893-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,16]],"date-time":"2021-11-16T21:36:57Z","timestamp":1637098617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39893-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540204619","9783540398936"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39893-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}