{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:22:31Z","timestamp":1725495751408},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540766360"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76637-7_13","type":"book-chapter","created":{"date-parts":[[2007,11,20]],"date-time":"2007-11-20T02:47:52Z","timestamp":1195526872000},"page":"191-205","source":"Crossref","is-referenced-by-count":5,"title":["Type-Based Verification of Correspondence Assertions for Communication Protocols"],"prefix":"10.1007","author":[{"given":"Daisuke","family":"Kikuchi","sequence":"first","affiliation":[]},{"given":"Naoki","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45789-5_25","volume-title":"Static Analysis","author":"B. Blanchet","year":"2002","unstructured":"Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 342\u2013359. Springer, Heidelberg (2002)"},{"key":"13_CR2","first-page":"97","volume-title":"CSF 2007","author":"B. Blanchet","year":"2007","unstructured":"Blanchet, B.: Computationally sound mechanized proofs of correspondence assertions. In: CSF 2007, pp. 97\u2013111. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/3-540-44898-5_4","volume-title":"Static Analysis","author":"J. Boyland","year":"2003","unstructured":"Boyland, J.: Checking interference with fractional permissions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694, pp. 55\u201372. Springer, Heidelberg (2003)"},{"key":"13_CR4","first-page":"145","volume-title":"CSFW 2001","author":"A.D. Gordon","year":"2001","unstructured":"Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. In: CSFW 2001, pp. 145\u2013159. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/CSFW.2002.1021808","volume-title":"CSFW-15","author":"A.D. Gordon","year":"2002","unstructured":"Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. In: CSFW-15, pp. 77\u201391. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-36532-X_17","volume-title":"Software Security \u2013 Theories and Systems","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 263\u2013282. Springer, Heidelberg (2003)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/S0304-3975(02)00333-X","volume":"300","author":"A.D. Gordon","year":"2003","unstructured":"Gordon, A.D., Jeffrey, A.: Typing correspondence assertions for communication protocols. Theoretical Computer Science\u00a0300, 379\u2013409 (2003)","journal-title":"Theoretical Computer Science"},{"issue":"1-3","key":"13_CR8","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/S0304-3975(03)00325-6","volume":"311","author":"A. Igarashi","year":"2004","unstructured":"Igarashi, A., Kobayashi, N.: A generic type system for the pi-calculus. Theoretical Computer Science\u00a0311(1-3), 121\u2013163 (2004)","journal-title":"Theoretical Computer Science"},{"key":"13_CR9","first-page":"105","volume-title":"Proceedings of International Conference on Functional Programming","author":"T. Terauchi","year":"2005","unstructured":"Terauchi, T., Aiken, A.: Witnessing side-effects. In: Proceedings of International Conference on Functional Programming, pp. 105\u2013115. ACM Press, New York (2005)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/11817949_15","volume-title":"CONCUR 2006 \u2013 Concurrency Theory","author":"T. Terauchi","year":"2006","unstructured":"Terauchi, T., Aiken, A.: A capability calculus for concurrency and determinism. In: Baier, C., Hermanns, H. (eds.) CONCUR 2006. LNCS, vol.\u00a04137, pp. 218\u2013232. Springer, Heidelberg (2006)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Woo, T.Y., Lam, S.S.: A semantic model for authentication protocols. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 178\u2013193 (1993)","DOI":"10.1109\/RISP.1993.287633"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76637-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:56:20Z","timestamp":1619506580000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76637-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540766360"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76637-7_13","relation":{},"subject":[]}}