{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:04Z","timestamp":1725491824242},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540752264"},{"type":"electronic","value":"9783540752271"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75227-1_6","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T01:32:47Z","timestamp":1189647167000},"page":"80-95","source":"Crossref","is-referenced-by-count":5,"title":["Formalizing and Analyzing Sender Invariance"],"prefix":"10.1007","author":[{"given":"Paul","family":"Hankes Drielsma","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"M\u00f6dersheim","sequence":"additional","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-36467-6_3","volume-title":"Privacy Enhancing Technologies","author":"M. Abadi","year":"2003","unstructured":"Abadi, M.: Private Authentication. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 27\u201340. Springer, Heidelberg (2003)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Arkko, J., Kempf, J., Zill, B., Nikander, P.: RFC3971 \u2013 SEcure Neighbor Discovery (SEND) (March 2005)","DOI":"10.17487\/rfc3971"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., He\u00e0m, P.C., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Aura, T.: RFC3972 \u2013 Cryptographically Generated Addresses (CGA) (March 2005)","DOI":"10.17487\/rfc3972"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/948109.948154","volume-title":"CCS 2003","author":"D. Basin","year":"2003","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: CCS 2003. Proceedings of CCS\u201903, pp. 335\u2013344. ACM Press, New York (2003)"},{"key":"6_CR6","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11591191_38","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol.\u00a03835, pp. 549\u2013564. Springer, Heidelberg (2005)"},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security\u00a04(3), 181\u2013208 (2005)","journal-title":"International Journal of Information Security"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"issue":"5","key":"6_CR9","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/49.223872","volume":"11","author":"C. Boyd","year":"1993","unstructured":"Boyd, C.: Security architectures using formal methods. IEEE Journal on Selected Areas in Communications\u00a011(5), 694\u2013701 (1993)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6_CR10","unstructured":"Bradner, S., Mankin, A., Schiller, J.I.: A framework for purpose built keys (PBK), Work in Progress (Internet Draft) (June 2003)"},{"key":"6_CR11","unstructured":"Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Mantovani, J., M\u00f6dersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proceedings of SAPS 2004, pp. 193\u2013205. Austrian Computer Society (2004)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: RFC2246 \u2013 The TLS Protocol Version 1 (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"6_CR14","first-page":"46","volume-title":"What do we mean by Entity Authentication","author":"D. Gollmann","year":"1996","unstructured":"Gollmann, D.: What do we mean by Entity Authentication. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 46\u201354. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: RFC3775 \u2013 Mobility Support in IPv6 (June 2004)","DOI":"10.17487\/rfc3775"},{"key":"6_CR16","first-page":"31","volume-title":"A hierarchy of authentication specifications","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications. Proceedings of CSFW 1997, pp. 31\u201343. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"6_CR17","unstructured":"Nikander, P., Kempf, J., Nordmark, E.: RFC3756 \u2013 IPv6 Neighbor Discovery (ND) Trust Models and Threats (May 2004)"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75227-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:56:38Z","timestamp":1619520998000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75227-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540752264","9783540752271"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75227-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}