{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:34:03Z","timestamp":1761597243228},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_16","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T04:16:22Z","timestamp":1292559382000},"page":"183-198","source":"Crossref","is-referenced-by-count":4,"title":["An Extended Logic for Analyzing Timed-Release Public-Key Protocols"],"prefix":"10.1007","author":[{"given":"Michiharu","family":"Kudo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anish","family":"Mathuria","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.: A Semantics for a Logic of Authentication. In: Proc. 10th ACM Symposium on Principles of Distributed Computing, pp. 201\u2013216 (August 1991)","DOI":"10.1145\/112600.112618"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bieber, P.: A Logic of Communication in Hostile Environment. In: Proc. IEEE Computer Security Foundations Workshop, pp. 14\u201322 (1990)","DOI":"10.1109\/CSFW.1990.128181"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Trans. on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. on Computer Systems"},{"issue":"1","key":"16_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1049\/ip-cdt:19970838","volume":"144","author":"T. Coffey","year":"1997","unstructured":"Coffey, T., Saidha, P.: Logic for Verifying Public-Key Cryptographic Protocols. IEEE Proc. Computers and Digital Techniques\u00a0144(1), 28\u201332 (1997)","journal-title":"IEEE Proc. Computers and Digital Techniques"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Gong, L., Needham, R., Yahalom, R.: Reasoning about Belief in Cryptographic Protocols. In: Proc. IEEE Symposium on Security and Privacy, pp. 234\u2013248 (May 1990)","DOI":"10.1109\/RISP.1990.63854"},{"key":"16_CR6","unstructured":"Gong, L., Syverson, P.: Fail-Stop Protocols: An Approach to Designing Secure Protocols. In: Pre-proc. 5th IFIP Working Conference on Dependable Computing for Critical Applications, pp. 44\u201355 (September 1995)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Mao, W., Boyd, C.: Towards Formal Analysis of Security Protocols. In: Proc. IEEE Computer Security Foundations Workshop, pp. 147\u2013158 (1993)","DOI":"10.1109\/CSFW.1993.246631"},{"key":"16_CR8","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-Lock Puzzles and Timed- Release Crypto. Technical Report, MIT Laboratory for Computer Science (1996)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Stubblebine, S.G., Wright, R.N.: An Authentication Logic Supporting Synchronization, Revocation, and Recency. In: Proc. 3rd ACM Conference on Computer and Communications Security, pp. 95\u2013105 (March 1996)","DOI":"10.1145\/238168.238195"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Syverson, P.: Adding Time to a Logic of Authentication. In: Proc. 1st ACM Conference on Computer and Communications Security, pp. 97\u2013101 (November 1993)","DOI":"10.1145\/168588.168600"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Syverson, P., van Oorschot, P.: On Unifying Some Cryptographic Protocol Logics. In: Proc. IEEE Symposium on Security and Privacy, pp. 14\u201328 (May 1994)","DOI":"10.21236\/ADA465512"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Wedel, G., Kessler, V.: Formal Semantics for Authentication Logics. In: Proc. European Symposium on Research in Security and Privacy, pp. 219\u2013241 (1996)","DOI":"10.1007\/3-540-61770-1_39"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T04:46:20Z","timestamp":1559882780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}