{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:03Z","timestamp":1725557883341},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206934"},{"type":"electronic","value":"9783540409816"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40981-6_3","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:17:45Z","timestamp":1277234265000},"page":"4-14","source":"Crossref","is-referenced-by-count":6,"title":["Verifying the SET Protocol: Overview"],"prefix":"10.1007","author":[{"given":"Lawrence C.","family":"Paulson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"3_CR1","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R. Anderson","year":"1994","unstructured":"Anderson, R.: Why cryptosystems fail. Comm. of the ACM\u00a037(11), 32\u201340 (1994)","journal-title":"Comm. of the ACM"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/586110.586113","volume-title":"9th ACM Conference on Computer and Communications Security","author":"G. Bella","year":"2002","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: The verification of an industrial payment protocol: The SET purchase phase. In: Atluri, V. (ed.) 9th ACM Conference on Computer and Communications Security, pp. 12\u201320. ACM Press, New York (2002)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bella, G., Massacci, F., Paulson, L.C.: Verifying the SET registration protocols. IEEE J. of Selected Areas in Communications\u00a021(1) (2003) (in press)","DOI":"10.1109\/JSAC.2002.806133"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/10722599_10","volume-title":"Computer Security - ESORICS 2000","author":"G. Bella","year":"2000","unstructured":"Bella, G., Massacci, F., Paulson, L.C., Tramontano, P.: Formal verification of cardholder registration in SET. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 159\u2013174. Springer, Heidelberg (2000)"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"Computer Security \u2013 ESORICS 98","author":"G. Bella","year":"1998","unstructured":"Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 361\u2013375. Springer, Heidelberg (1998)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/CSFW.2000.856933","volume-title":"Proc. of the 13th IEEE Comp. Sec. Found. Workshop","author":"E. Cohen","year":"2000","unstructured":"Cohen, E.: TAPS: A first-order verifier for cryptographic protocols. In: Proc. of the 13th IEEE Comp. Sec. Found. Workshop, pp. 144\u2013158. IEEE Comp. Society Press, Los Alamitos (2000)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"3_CR8","unstructured":"Mastercard & VISA. SET Secure Electronic Transaction Specification: Business Description (May 1997), Available electronically at \n                    \n                      http:\/\/www.setco.org\/set_specifications.html"},{"key":"3_CR9","unstructured":"Mastercard & VISA. SET Secure Electronic Transaction Specification: Formal Protocol Definition (May 1997), Available electronically at \n                    \n                      http:\/\/www.setco.org\/set_specifications.html"},{"key":"3_CR10","unstructured":"Mastercard & VISA. SET Secure Electronic Transaction Specification: Programmer\u2019s Guide (May 1997), Available electronically at \n                    \n                      http:\/\/www.setco.org\/set_specifications.html"},{"key":"3_CR11","first-page":"216","volume-title":"SSP 1999","author":"C. Meadows","year":"1999","unstructured":"Meadows, C.: Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In: SSP 1999, pp. 216\u2013231. IEEE Comp. Society Press, Los Alamitos (1999)"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-Order Logic","year":"2002","unstructured":"Nipkow, T., Paulson, L.C., Wenzel, M.T. (eds.): Isabelle\/HOL: A Proof Assistant for Higher-Order Logic. LNCS, vol.\u00a02283. Springer, Heidelberg (2002)"},{"key":"3_CR13","first-page":"85","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. J. of Comp. Sec.\u00a06, 85\u2013128 (1998)","journal-title":"J. of Comp. Sec."},{"issue":"3","key":"3_CR14","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"L.C. Paulson","year":"1999","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. on Inform. and Sys. Sec.\u00a02(3), 332\u2013351 (1999)","journal-title":"ACM Trans. on Inform. and Sys. Sec."},{"issue":"3","key":"3_CR15","first-page":"197","volume":"9","author":"L.C. Paulson","year":"2001","unstructured":"Paulson, L.C.: Relations between secrets: Two formal analyses of the Yahalom protocol. J. of Comp. Sec.\u00a09(3), 197\u2013216 (2001)","journal-title":"J. of Comp. Sec."},{"issue":"15","key":"3_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/S0020-0190(97)00180-4","volume":"65","author":"P. Ryan","year":"1998","unstructured":"Ryan, P., Schneider, S.: An attack on a recurive authentication protocol. a cautionary tale. Inform. Processing Lett.\u00a065(15), 7\u201316 (1998)","journal-title":"Inform. Processing Lett."}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40981-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:09:53Z","timestamp":1552612193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40981-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206934","9783540409816"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40981-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}