{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:03Z","timestamp":1725557883246},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206934"},{"type":"electronic","value":"9783540409816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40981-6_2","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T15:17:45Z","timestamp":1277219865000},"page":"3-3","source":"Crossref","is-referenced-by-count":0,"title":["Authenticity Types for Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Andy","family":"Gordon","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/CSFW.2001.930143","volume-title":"14th IEEE Computer Security Foundations Workshop (CSFW 2001)","author":"A.D. Gordon","year":"2001","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. In: 14th IEEE Computer Security Foundations Workshop (CSFW 2001), Cape Breton, June 11-13, pp. 145\u2013159. IEEE Computer Society, Los Alamitos (2001); A journal version is to appear in the it Journal of Computer Security"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/CSFW.2002.1021808","volume-title":"15th IEEE Computer Security Foundations Workshop (CSFW 2002)","author":"A.D. Gordon","year":"2002","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: 15th IEEE Computer Security Foundations Workshop (CSFW 2002), Cape Breton, June 24-26, pp. 77\u201391. IEEE Computer Society, Los Alamitos (2002)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Gordon, A.D., Pucella, R.: Validating a web service security abstraction by typing. In: 2002 ACM Workshop on XML Security (XML Security 2002), George Mason University, November 22 (2002)","DOI":"10.1145\/764792.764797"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40981-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T21:24:25Z","timestamp":1552598665000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40981-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206934","9783540409816"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40981-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}