{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:23:16Z","timestamp":1742916196946,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748342"},{"type":"electronic","value":"9783540748359"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74835-9_39","type":"book-chapter","created":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T10:03:08Z","timestamp":1189159388000},"page":"594-609","source":"Crossref","is-referenced-by-count":3,"title":["On the Automated Correction of Security Protocols Susceptible to a Replay Attack"],"prefix":"10.1007","author":[{"given":"Juan C.","family":"Lopez P.","sequence":"first","affiliation":[]},{"given":"Ra\u00fal","family":"Monroy","sequence":"additional","affiliation":[]},{"given":"Dieter","family":"Hutter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"39_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Needham, R.: Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering\u00a022(1), 6\u201315 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"39_CR2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s00145-001-0014-7","volume":"15","author":"M. Abadi","year":"2002","unstructured":"Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology\u00a015(2), 103\u2013127 (2002)","journal-title":"Journal of Cryptology"},{"key":"39_CR3","first-page":"59","volume-title":"CSFW 1997","author":"T. Aura","year":"1997","unstructured":"Aura, T.: Strategies against replay attacks. In: CSFW 1997. Proceedings of the 10th IEEE Computer Security Foundations Workshop, pp. 59\u201369. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"39_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/BFb0012826","volume-title":"9th International Conference on Automated Deduction","author":"A. Bundy","year":"1988","unstructured":"Bundy, A.: The use of explicit plans to guide inductive proofs. In: Lusk, R., Overbeek, R. (eds.) 9th International Conference on Automated Deduction. LNCS, vol.\u00a0310, pp. 111\u2013120. Springer, Heidelberg (1988)"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/CSFW.1994.315934","volume-title":"Computer Security Foundations Workshop, CSFW\u201894","author":"U. Carlsen","year":"1994","unstructured":"Carlsen, U.: Cryptographic protocols flaws. In: Computer Security Foundations Workshop, CSFW\u201894. Proceedings of the 7th IEEE Computer Security Foundations Workshop, pp. 192\u2013200. IEEE Computer Society, Los Alamitos (1994)"},{"unstructured":"Raymond Choo, K.-K.: An integrative framework to protocol analysis and repair: Indistinguishability-based model + planning + model checker. In: Proceedings of Five-minute Talks at CSFW\u201906. Computer Security Foundations Workshop (2006)","key":"39_CR6"},{"unstructured":"Clark, J., Jacob, J.: A survey of authentication protocol literature: v1.0. Technical report, Department of Computer Science, University of York (November 1997)","key":"39_CR7"},{"unstructured":"Proceedings of the 7th IEEE Computer Security Foundations Workshop. CSFW 1994. IEEE Computer Society (1994)","key":"39_CR8"},{"issue":"2","key":"39_CR9","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/S0304-3975(01)00139-6","volume":"283","author":"J.-D. Guttman","year":"2002","unstructured":"Guttman, J.-D., Thayer, F.-J.: Authentication tests and the structure of bundles. Theoretical Computer Science\u00a0283(2), 333\u2013380 (2002)","journal-title":"Theoretical Computer Science"},{"key":"39_CR10","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.entcs.2006.12.034","volume":"174","author":"J.C. L\u00f3pez-Pimentel","year":"2007","unstructured":"L\u00f3pez-Pimentel, J.C., Monroy, R., Hutter, D.: A method for patching interleaving-replay attacks in faulty security protocols. Electronic Notes in Theoretical Computer Science\u00a0174, 117\u2013130 (2007)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"unstructured":"Lowe, G.: A family of attacks upon authentication protocols. Technical Report 1997\/5, Department of Mathematics and Computer Science, University of Leicester (1997)","key":"39_CR11"},{"issue":"1-2","key":"39_CR12","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal in Computer Security\u00a06(1-2), 85\u2013128 (1998)","journal-title":"Journal in Computer Security"},{"key":"39_CR13","first-page":"64","volume-title":"Proceedings of the 13th CSFW 2000","author":"A. Perrig","year":"2000","unstructured":"Perrig, A., Song, D.: Looking for diamonds in the desert \u2014 extending automatic protocol generation to three-party authentication and key agreement protocols. In: Proceedings of the 13th CSFW 2000, pp. 64\u201376. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"39_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/CSFW.1994.315935","volume-title":"Computer Security Foundations Workshop, CSFW 1994","author":"P. Syverson","year":"1994","unstructured":"Syverson, P.: A taxonomy of replay attacks. In: Computer Security Foundations Workshop, CSFW 1994. Proceedings of the 7th IEEE Computer Security Foundations Workshop, pp. 187\u2013191. IEEE Computer Society, Los Alamitos (1994)"},{"key":"39_CR15","first-page":"160","volume-title":"Proceedings Symposium on Security and Privacy","author":"F.J. Thayer Fabrega","year":"1998","unstructured":"Thayer Fabrega, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: Proceedings Symposium on Security and Privacy, pp. 160\u2013171. IEEE Computer Society Press, Los Alamitos (1998)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74835-9_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:09:50Z","timestamp":1559506190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74835-9_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540748342","9783540748359"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74835-9_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}