{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:09:01Z","timestamp":1725574141950},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540669678"},{"type":"electronic","value":"9783540465881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/978-3-540-46588-1_14","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T21:55:48Z","timestamp":1294350948000},"page":"196-209","source":"Crossref","is-referenced-by-count":1,"title":["Security of Public Key Certificate Based Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Wu","family":"Wen","sequence":"first","affiliation":[]},{"given":"Takamichi","family":"Saito","sequence":"additional","affiliation":[]},{"given":"Fumio","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Technical Report 39, DEC Systems Research Center (February 1989)","DOI":"10.1145\/74850.74852"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: The tls protocl: Version 1.0. Technical Report drat-ietftls- rptocol-05.txt.Z, IETF task force (May 1998)","DOI":"10.17487\/rfc2246"},{"issue":"6","key":"14_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"14_CR4","unstructured":"Eaves, W.D.: Transport level security: a proof using the gny logic. Technical report, Brunel University, UK (February 1989)"},{"key":"14_CR5","unstructured":"Ellison, C.: Can we eliminate crl? Technical report, extended abstract (November 1997)"},{"key":"14_CR6","unstructured":"Ellison, C., et al.: Spki certificate theory, internet draft. Technical report, IETF SPKI Working Group (November 1997)"},{"key":"14_CR7","unstructured":"Kohnfelder, L.: Towards a practical public-key cryptosystem. Technical report, MIT (1978)"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Lowe, G.: Breaking and fixing the needham-schroeder public key protocol using csp and fdr. In: TACAS 1996 (1996)","DOI":"10.1007\/3-540-61042-1_43"},{"key":"14_CR9","unstructured":"Mitchell, J., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using murphi. In: IEEE Symposium on security and privacy, pp. 141\u2013151 (1997)"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/382258.382789","volume":"24","author":"D. Nessett","year":"1990","unstructured":"Nessett, D.: A critique of the burrows, abadi and needham logic. ACM Operating Systems Review\u00a024(2), 35\u201338 (1990)","journal-title":"ACM Operating Systems Review"},{"key":"14_CR11","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L. Paulson","year":"1998","unstructured":"Paulson, L.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"14_CR12","unstructured":"Roscoe, A.W.: The perfect \u2019spy\u2019 for model-checking crypto protocols. In: DIMACS Workshop on Design and Formal Verification of Security Protocols, Piscataway, NJ (September 1997)"},{"key":"14_CR13","unstructured":"Saito, T., Wen, W., Mizoguchi, F.: Analysis of authentication protocol by parameterized ban logic. Technical report, ISEC (July 1999)"},{"key":"14_CR14","unstructured":"Wen, W., Mizoguchi, F.: Model checking security protocols. In: Symposium on Cryptography and Information Security, Kobe, Japan, January 28-29, pp. 647\u2013652 (1999)"},{"key":"14_CR15","unstructured":"Wen, W., Saito, T., Mizoguchi, F.: New results of model checking needhamschroeder protocol. In: Proceedings of 1999 Computer Security Symposium, Kanazawa, Japan, October 21-22, pp. 69\u201374 (1999)"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-46588-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T16:56:41Z","timestamp":1559926601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-46588-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540669678","9783540465881"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-46588-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}