{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:07:22Z","timestamp":1725502042389},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540775041"},{"type":"electronic","value":"9783540775058"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77505-8_15","type":"book-chapter","created":{"date-parts":[[2008,1,24]],"date-time":"2008-01-24T07:56:35Z","timestamp":1201161395000},"page":"197-213","source":"Crossref","is-referenced-by-count":7,"title":["Secrecy Analysis in Protocol Composition Logic"],"prefix":"10.1007","author":[{"given":"Arnab","family":"Roy","sequence":"first","affiliation":[]},{"given":"Anupam","family":"Datta","sequence":"additional","affiliation":[]},{"given":"Ante","family":"Derek","sequence":"additional","affiliation":[]},{"given":"John C.","family":"Mitchell","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"IEEE P802.11i\/D10.0. Medium Access Control (MAC) security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications (April 2004)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J.-K.: Cryptographically sound security proofs for basic and public-key kerberos. In: Proceedings of 11th European Symposium on Research in Computer Security (2006)","DOI":"10.1007\/11863908_23"},{"key":"15_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BFb0055875","volume-title":"ESORICS 1998","author":"G. Bella","year":"1998","unstructured":"Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol.\u00a01485, pp. 361\u2013375. Springer, Heidelberg (1998)"},{"key":"15_CR4","first-page":"175","volume-title":"Fifteenth Computer Security Foundations Workshop \u2014 CSFW-15","author":"F. Butler","year":"2002","unstructured":"Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: A Formal Analysis of Some Properties of Kerberos 5 Using MSR. In: Fifteenth Computer Security Foundations Workshop \u2014 CSFW-15, Cape Breton, NS, Canada, 24\u201326 June 2002, pp. 175\u2013190. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: Verifying confidentiality and authentication in kerberos 5. In: ISSS, pp. 1\u201324 (2003)","DOI":"10.1007\/978-3-540-37621-7_1"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Kaufman, E.C.: Internet Key Exchange (IKEv2) Protocol, RFC 4306 (2005)","DOI":"10.17487\/rfc4306"},{"key":"15_CR7","unstructured":"Cervesato, I., Jaggard, A., Scedrov, A., Tsay, J.-K., Walstad, C.: Breaking and fixing public-key kerberos. Technical report"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure protocol composition. In: Proceedings of ACM Workshop on Formal Methods in Security Engineering, October","DOI":"10.1145\/1035429.1035431"},{"key":"15_CR9","first-page":"109","volume-title":"Proceedings of 16th IEEE Computer Security Foundations Workshop","author":"A. Datta","year":"2003","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system for security protocols and its logical formalization. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 109\u2013125. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure protocol composition. In: Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics, vol. 83. Electronic Notes in Theoretical Computer Science (2004)","DOI":"10.1016\/S1571-0661(03)50011-1"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"423","DOI":"10.3233\/JCS-2005-13304","volume":"13","author":"A. Datta","year":"2005","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security\u00a013, 423\u2013482 (2005)","journal-title":"Journal of Computer Security"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/CSFW.2005.26","volume-title":"18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005)","author":"R. Delicata","year":"2005","unstructured":"Delicata, R., Schneider, S.: Temporal rank functions for forward secrecy. In: 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), pp. 126\u2013139. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"15_CR13","unstructured":"Delicata, R., Schneider, S.A.: Towards the rank function verification of protocols that use temporary secrets. In: WITS 2004. Proceedings of the Workshop on Issues in the Theory of Security (2004)"},{"key":"15_CR14","first-page":"241","volume-title":"Proceedings of 14th IEEE Computer Security Foundations Workshop","author":"N. Durgin","year":"2001","unstructured":"Durgin, N., Mitchell, J.C., Pavlovic, D.: A compositional logic for protocol correctness. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, pp. 241\u2013255. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"He, C., Sundararajan, M., Datta, A., Derek, A., Mitchell, J.C.: A modular correctness proof of ieee 802.11i and tls. In: ACM Conference on Computer and Communications Security, pp. 2\u201315 (2005)","DOI":"10.1145\/1102120.1102124"},{"key":"15_CR16","unstructured":"Heather, J.: Strand spaces and rank functions: More than distant cousins. In: CSFW 2002. Proceedings of the 15th IEEE Computer Security Foundations Workshop, p. 104 (2002)"},{"key":"15_CR17","unstructured":"Kohl, J., Neuman, B.: The kerberos network authentication service. RFC 1510 (1991)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Schneider, S.: Verifying authentication protocols with csp. IEEE Transactions on Software Engineering, pp. 741\u2013758 (1998)","DOI":"10.1109\/32.713329"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security\u00a07(1) (1999)","DOI":"10.3233\/JCS-1999-72-304"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, L., Tung, B.: Public key cryptography for initial authentication in kerberos, Internet Draft (2006)","DOI":"10.17487\/rfc4556"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77505-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T04:57:14Z","timestamp":1557205034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77505-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540775041","9783540775058"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77505-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}