{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:56:36Z","timestamp":1760424996065,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540205371"},{"type":"electronic","value":"9783540400202"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40020-2_15","type":"book-chapter","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T18:42:34Z","timestamp":1277318554000},"page":"268-283","source":"Crossref","is-referenced-by-count":2,"title":["The Coinductive Approach to Verifying Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Jesse","family":"Hughes","sequence":"first","affiliation":[]},{"given":"Martijn","family":"Warnier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"36","volume-title":"Proceedings of the Fourth ACM Conference on Computer and Communications Security","author":"M. Abadi","year":"1997","unstructured":"Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, April 1997, pp. 36\u201347. ACM Press, New York (1997)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proc. Royal Soc., Series A\u00a0426, 233\u2013271 (1989)","journal-title":"Proc. Royal Soc., Series A"},{"key":"15_CR3","unstructured":"Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature, version 1.0 (1997), available at http:\/\/www-users.cs.york.ac.uk\/~jac\/papers\/drareview.ps.gz"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(6) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters\u00a056, 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"15_CR6","volume-title":"PCSFW: Proceedings of The 10th Computer Security Foundations Workshop","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. In: PCSFW: Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: 8th ACM Conference on Computer and Communication Security, ACM SIGSAC, November 2001, pp. 166\u2013175 (2001)","DOI":"10.1145\/501983.502007"},{"issue":"12","key":"15_CR8","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"issue":"2","key":"15_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/32.345827","volume":"21","author":"S. Owre","year":"1995","unstructured":"Owre, S., Rushby, J.M., Shankar, N., von Henke, F.: Formal verification for fault-tolerant architectures: Prolegomena to the design of PVS. IEEE Trans. on Softw. Eng.\u00a021(2), 107\u2013125 (1995)","journal-title":"IEEE Trans. on Softw. Eng."},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030541","volume-title":"Isabelle: A Generic Theorem Prover","author":"L.C. Paulson","year":"1994","unstructured":"Paulson, L.C.: Isabelle. LNCS, vol.\u00a0828. Springer, Heidelberg (1994)"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journ. of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journ. of Computer Security"},{"key":"15_CR12","unstructured":"Rothe, J., Tews, H., Jacobs, B.: The coalgebraic class specification language CCSL. Journal of Universal Comp. Sci.\u00a07(2) (2001)"},{"key":"15_CR13","unstructured":"Shanker, N., Owre, S., Rushby, J.M., Stringer-Calvert, D.: PVS prover guide, Version 2.3 (1999)"},{"key":"15_CR14","unstructured":"Tews, H.: Coalgebraic Methods for Object Oriented Specification. PhD thesis, Technical University of Dresden (October 2002)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(1) (1999)","DOI":"10.3233\/JCS-1999-72-304"}],"container-title":["Lecture Notes in Computer Science","Recent Trends in Algebraic Development Techniques"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40020-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T06:54:27Z","timestamp":1559199267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40020-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540205371","9783540400202"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40020-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}