{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:20:24Z","timestamp":1743038424855,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540887324"},{"type":"electronic","value":"9783540887331"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88733-1_20","type":"book-chapter","created":{"date-parts":[[2008,10,16]],"date-time":"2008-10-16T22:08:02Z","timestamp":1224194882000},"page":"283-297","source":"Crossref","is-referenced-by-count":4,"title":["A Universally Composable Framework for the Analysis of Browser-Based Security Protocols"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Gajek","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Barak, B., Lindell, Y., Rabin, T.: Protocol initialization for the framework of universal composability. Cryptology ePrint Archive, Report 2004\/006 (2004), http:\/\/eprint.iacr.org\/"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"M. Bellare","year":"1994","unstructured":"Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 232\u2013249. Springer, Heidelberg (1994)"},{"key":"20_CR3","first-page":"136","volume-title":"FOCS","author":"R. Canetti","year":"2001","unstructured":"Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145. IEEE Computer Society, Los Alamitos (2001)"},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10626-007-0032-1","volume":"18","author":"R. Canetti","year":"2008","unstructured":"Canetti, R., Cheung, L., Kaynar, D., Liskov, M., Lynch, N., Pereira, O., Segala, R.: Analyzing Security Protocols Using Time-Bounded Task-PIOAs. Discrete Event Dynamic Systems\u00a018(1), 111\u2013159 (2008)","journal-title":"Discrete Event Dynamic Systems"},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/11818175_10","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"R. Canetti","year":"2006","unstructured":"Canetti, R., Halevi, S., Steiner, M.: Mitigating dictionary attacks on password-protected local storage. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 160\u2013179. Springer, Heidelberg (2006)"},{"key":"20_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/3-540-46035-7_22","volume-title":"Advances in Cryptology - EUROCRYPT 2002","author":"R. Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Universally composable notions of key exchange and secure channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol.\u00a02332, pp. 337\u2013351. Springer, Heidelberg (2002)"},{"key":"20_CR7","first-page":"581","volume-title":"CHI","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.A.: Why phishing works. In: CHI, pp. 581\u2013590. ACM, New York (2006)"},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR9","unstructured":"Ellison, C.: Ceremony design and analysis. Cryptology ePrint Archive, Report 2007\/399 (2007)"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/1368310.1368354","volume-title":"ASIACCS","author":"S. Gajek","year":"2008","unstructured":"Gajek, S., Manulis, M., Sadeghi, A.-R., Schwenk, J.: Provably secure browser-based user-aware mutual authentication over TLS. In: ASIACCS, pp. 300\u2013311. ACM Press, New York (2008)"},{"key":"#cr-split#-20_CR11.1","unstructured":"Gross, T., Pfitzmann, B.: SAML artifact information flow revisited. In: IEEE Workshop on Web Services Security, Berkeley, USA (May 2006);"},{"key":"#cr-split#-20_CR11.2","unstructured":"Appeared also as IBM Research Report RZ 3643 (#99653) 01\/03\/06, IBM Research Division, Zurich (January 2006)"},{"key":"20_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/11555827_28","volume-title":"Computer Security \u2013 ESORICS 2005","author":"T. Gro\u00df","year":"2005","unstructured":"Gro\u00df, T., Pfitzmann, B., Sadeghi, A.-R.: Browser model for security analysis of browser-based protocols. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 489\u2013508. Springer, Heidelberg (2005)"},{"key":"20_CR13","unstructured":"Herzberg, A.: Why Johnny can\u2019t surf, safely? (Work in Progress) (2007)"},{"key":"20_CR14","unstructured":"Herzberg, A., Yoffe, I.: Layered specifications, design and analysis of security protocols. Cryptology ePrint Archive, Report 2006\/398 (2006)"},{"key":"20_CR15","first-page":"421","volume-title":"CCS 2007","author":"C. Jackson","year":"2007","unstructured":"Jackson, C., Barth, A., Bortz, A., Shao, W., Boneh, D.: Protecting browsers from dns rebinding attacks. In: CCS 2007, pp. 421\u2013431. ACM, New York (2007)"},{"key":"20_CR16","first-page":"58","volume-title":"CCS 2007","author":"C. Karlof","year":"2007","unstructured":"Karlof, C., Shankar, U., Tygar, J.D., Wagner, D.: Dynamic pharming attacks and locked same-origin policies for web browsers. In: CCS 2007, pp. 58\u201371. ACM, New York (2007)"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: A model for asynchronous reactive systems and its application to secure message transmission. In: IEEE Symposium on Security and Privacy, pp. 184\u2013200 (2001)","DOI":"10.1109\/SECPRI.2001.924298"},{"issue":"6","key":"20_CR18","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2003.1250582","volume":"7","author":"B. Pfitzmann","year":"2003","unstructured":"Pfitzmann, B., Waidner, M.: Analysis of liberty single-sign-on with enabled clients. IEEE Internet Computing\u00a07(6), 38\u201344 (2003)","journal-title":"IEEE Internet Computing"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Sebastian Gajek, M.M., Pereira, O.: Universally composable security analysis of tls\u2014secure sessions with handshake and record layer protocols. Cryptology ePrint Archive, Report 2008\/251 (2008), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-540-88733-1_22"},{"key":"20_CR20","unstructured":"Shoup, V.: On formal models for secure key exchange (version 4). Technical report, IBM Research Report RZ 3120, November 15 (1999)"},{"key":"20_CR21","unstructured":"Soghoian, C., Jakobsson, M.: A deceit-augmented man in the middle attack against bank of america\u2019s sitekey service (2007)"},{"key":"20_CR22","first-page":"51","volume-title":"Symposium on Security and Privacy","author":"A.O. Stuart Schechter","year":"2007","unstructured":"Stuart Schechter, A.O., Dhamija, R., Fischer, I.: The emperor\u2019s new security indicators. In: Symposium on Security and Privacy, pp. 51\u201365. IEEE Computer Society, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Provable Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88733-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T14:45:09Z","timestamp":1557845109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88733-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540887324","9783540887331"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88733-1_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}