{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T20:36:42Z","timestamp":1765485402679,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":64,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642038280"},{"type":"electronic","value":"9783642038297"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03829-7_6","type":"book-chapter","created":{"date-parts":[[2009,8,10]],"date-time":"2009-08-10T05:05:20Z","timestamp":1249880720000},"page":"166-194","source":"Crossref","is-referenced-by-count":20,"title":["The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"M\u00f6dersheim","sequence":"first","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","first-page":"62","volume-title":"Proceedings of CSFW 2005","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Cortier, V.: Deciding knowledge in security protocols under (many more) equational theories. In: Proceedings of CSFW 2005, pp. 62\u201376. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1007\/3-540-44618-4_28","volume-title":"CONCUR 2000 - Concurrency Theory","author":"R.M. Amadio","year":"2000","unstructured":"Amadio, R.M., Lugiez, D.: On the reachability problem in cryptographic protocols. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 380\u2013394. Springer, Heidelberg (2000)"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.ic.2007.07.002","volume":"206","author":"S. Andova","year":"2008","unstructured":"Andova, S., Cremers, C., Gj\u00f8steen, K., Mauw, S., Mj\u00f8lsnes, S., Radomirovi\u0107, S.: A framework for compositional verification of security protocols. Information and Computation\u00a0206, 425\u2013459 (2008)","journal-title":"Information and Computation"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-89439-1_9","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"M. Arapinis","year":"2008","unstructured":"Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS, vol.\u00a05330, pp. 128\u2013142. Springer, Heidelberg (2008)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/11513988_27","volume-title":"Computer Aided Verification","author":"A. Armando","year":"2005","unstructured":"Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., H\u00e9am, P.-C., Mantovani, J., M\u00f6dersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Vigan\u00f2, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 281\u2013285. Springer, Heidelberg (2005)"},{"key":"6_CR6","first-page":"385","volume-title":"Proceedings of CSF 2007","author":"A. Armando","year":"2007","unstructured":"Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Proceedings of CSF 2007, pp. 385\u2013396. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"6_CR7","unstructured":"AVISPA. Deliverable 2.3: The Intermediate Format (2003), \n                      \n                        http:\/\/www.avispa-project.org"},{"key":"6_CR8","unstructured":"AVISPA. Deliverable 7.4: Assessment of the AVISPA Tool v. 3 (2005), \n                      \n                        http:\/\/www.avispa-project.org"},{"key":"6_CR9","unstructured":"The AVISPA Library of Protocols, \n                      \n                        http:\/\/www.avispa-project.org\/library"},{"key":"6_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139172752","volume-title":"Term Rewriting and All That","author":"F. Baader","year":"1998","unstructured":"Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)"},{"key":"6_CR11","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11591191_38","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol.\u00a03835, pp. 549\u2013564. Springer, Heidelberg (2005)"},{"issue":"3","key":"6_CR12","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10207-004-0055-7","volume":"4","author":"D. Basin","year":"2005","unstructured":"Basin, D., M\u00f6dersheim, S., Vigan\u00f2, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security\u00a04(3), 181\u2013208 (2005)","journal-title":"International Journal of Information Security"},{"key":"6_CR13","first-page":"82","volume-title":"Proceedings of CSFW 2001","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of CSFW 2001, pp. 82\u201396. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/S0004-3702(96)00047-1","volume":"90","author":"A.L. Blum","year":"1997","unstructured":"Blum, A.L., Furst, M.L.: Fast planning through planning graph analysis. Artificial Intelligence\u00a090, 281\u2013300 (1997)","journal-title":"Artificial Intelligence"},{"key":"6_CR15","first-page":"126","volume-title":"Proceedings of CSFW 2003","author":"C. Bodei","year":"2003","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proceedings of CSFW 2003, pp. 126\u2013140. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"6_CR16","unstructured":"Boichut, Y., H\u00e9am, P.-C., Kouchnarenko, O.: Tree automata for detecting attacks on protocols with algebraic cryptographic primitives. In: Proceedings of the INFINITY 2007 Workshop (2007) (to appear in ENTCS)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/3-540-48224-5_55","volume-title":"Automata, Languages and Programming","author":"M. Boreale","year":"2001","unstructured":"Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.\u00a02076, pp. 667\u2013681. Springer, Heidelberg (2001)"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/3-540-45694-5_32","volume-title":"CONCUR 2002 - Concurrency Theory","author":"M. Boreale","year":"2002","unstructured":"Boreale, M., Buscemi, M.G.: A framework for the analysis of security protocols. In: Brim, L., Jan\u010dar, P., K\u0159et\u00ednsk\u00fd, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.\u00a02421, pp. 483\u2013498. Springer, Heidelberg (2002)"},{"key":"6_CR19","unstructured":"Bradner, S., Mankin, A., Schiller, J.: A framework for purpose built keys (PBK). Work in Progress (June 2003), Internet Draft: \n                      \n                        draft-bradner-pbk-frame-06.txt"},{"key":"6_CR20","first-page":"175","volume-title":"Proceedings of CSFW 2002","author":"F. Butler","year":"2002","unstructured":"Butler, F., Cervesato, I., Jaggard, A., Scedrov, A.: A formal analysis of some properties of Kerberos 5 using MSR. In: Proceedings of CSFW 2002, pp. 175\u2013190. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"6_CR21","first-page":"35","volume-title":"Proceedings of CSFW 2000","author":"I. Cervesato","year":"2000","unstructured":"Cervesato, I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Relating Strands and Multiset Rewriting for Security Protocol Analysis. In: Proceedings of CSFW 2000, pp. 35\u201351. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-540-24597-1_11","volume-title":"FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science","author":"Y. Chevalier","year":"2003","unstructured":"Chevalier, Y., K\u00fcsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with diffie-hellman exponentiation and products in exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol.\u00a02914, pp. 124\u2013135. Springer, Heidelberg (2003)"},{"key":"6_CR23","first-page":"373","volume-title":"Proceedings of ASE 2001","author":"Y. Chevalier","year":"2001","unstructured":"Chevalier, Y., Vigneron, L.: A Tool for Lazy Verification of Security Protocols. In: Proceedings of ASE 2001, pp. 373\u2013376. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/3-540-45657-0_24","volume-title":"Computer Aided Verification","author":"Y. Chevalier","year":"2002","unstructured":"Chevalier, Y., Vigneron, L.: Automated unbounded verification of security protocols. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, pp. 324\u2013337. Springer, Heidelberg (2002)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/3-540-45789-5_24","volume-title":"Static Analysis","author":"R. Corin","year":"2002","unstructured":"Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 326\u2013341. Springer, Heidelberg (2002)"},{"issue":"1","key":"6_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10703-008-0059-4","volume":"34","author":"V. Cortier","year":"2009","unstructured":"Cortier, V., Delaune, S.: Safely composing security protocols. Formal Methods in System Design\u00a034(1), 1\u201336 (2009)","journal-title":"Formal Methods in System Design"},{"issue":"1","key":"6_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3233\/JCS-2006-14101","volume":"14","author":"V. Cortier","year":"2006","unstructured":"Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security\u00a014(1), 1\u201343 (2006)","journal-title":"Journal of Computer Security"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Cousot, P.: Abstract interpretation. Symposium on Models of Programming Languages and Computation. ACM Computing Surveys 28(2), 324\u2013328 (1996)","DOI":"10.1145\/234528.234740"},{"key":"6_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J.F. Cremers","year":"2008","unstructured":"Cremers, C.J.F.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008)"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1035429.1035431","volume-title":"Proceedings of the 2003 ACM workshop on Formal methods in security engineering","author":"A. Datta","year":"2003","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure protocol composition. In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pp. 11\u201323. ACM Press, New York (2003)"},{"key":"6_CR31","first-page":"239","volume-title":"Proceedings of CSF 2008","author":"S. Delaune","year":"2008","unstructured":"Delaune, S., Kremer, S., Ryan, M.D.: Composition of password-based protocols. In: Proceedings of CSF 2008, pp. 239\u2013251. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"6_CR32","unstructured":"Denker, G., Millen, J.K., Rue\u00df, H.: The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-02, SRI International, Menlo Park, CA (2000)"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Dierks, T., Allen, C.: RFC2246 \u2013 The TLS Protocol Version 1 (January 1999)","DOI":"10.17487\/rfc2246"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"6_CR35","unstructured":"Durgin, N., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Undecidability of Bounded Security Protocols. In: Proceedings of the FLOC\u201999 Workshop on Formal Methods and Security Protocols, FMSP 1999 (1999)"},{"key":"6_CR36","first-page":"34","volume-title":"Proceedings of FOCS 1983","author":"S. Even","year":"1983","unstructured":"Even, S., Goldreich, O.: On the security of multi-party ping pong protocols. In: Proceedings of FOCS 1983, pp. 34\u201339. IEEE Computer Society Press, Los Alamitos (1983)"},{"key":"6_CR37","first-page":"160","volume-title":"Proceedings of CSFW 2001","author":"M. Fiore","year":"2001","unstructured":"Fiore, M., Abadi, M.: Computing Symbolic Models for Verifying Cryptographic Protocols. In: Proceedings of CSFW 2001, pp. 160\u2013173. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"6_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/10721959_21","volume-title":"Automated Deduction - CADE-17","author":"T. Genet","year":"2000","unstructured":"Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAllester, D. (ed.) CADE 2000. LNCS, vol.\u00a01831, pp. 271\u2013290. Springer, Heidelberg (2000)"},{"key":"6_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1007\/3-540-45591-4_134","volume-title":"Parallel and Distributed Processing","author":"J. Goubault-Larrecq","year":"2000","unstructured":"Goubault-Larrecq, J.: A method for automatic cryptographic protocol verification. In: Rolim, J.D.P. (ed.) IPDPS-WS 2000. LNCS, vol.\u00a01800, pp. 977\u2013984. Springer, Heidelberg (2000)"},{"key":"6_CR40","doi-asserted-by":"crossref","unstructured":"Guttman, J.D.: Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security\u00a03\u20134(12), 409\u2013433 (2004)","DOI":"10.3233\/JCS-2004-123-405"},{"key":"6_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/978-3-642-00596-1_22","volume-title":"FOSSACS 2009","author":"J.D. Guttman","year":"2009","unstructured":"Guttman, J.D.: Cryptographic protocol composition via the authentication tests. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.\u00a05504, pp. 303\u2013317. Springer, Heidelberg (2009)"},{"key":"6_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-540-75227-1_6","volume-title":"Formal Aspects in Security and Trust","author":"P. Hankes Drielsma","year":"2007","unstructured":"Hankes Drielsma, P., M\u00f6dersheim, S., Vigan\u00f2, L., Basin, D.: Formalizing and analyzing sender invariance. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.\u00a04691, pp. 80\u201395. Springer, Heidelberg (2007)"},{"key":"6_CR43","unstructured":"Huima, A.: Efficient Infinite-State Analysis of Security Protocols. In: Proceedings of the FLOC 1999 Workshop on Formal Methods and Security Protocols, FMSP 1999 (1999)"},{"key":"6_CR44","unstructured":"ITU-T Recommendation H.530: Symmetric Security Procedures for H.510 (Mobility for H.323 Multimedia Systems and Services) (2002)"},{"key":"6_CR45","unstructured":"ITU-T Recommendation H.530, Corrigendum\u00a01 (2003); Corrected version of [44]"},{"key":"6_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44404-1_10","volume-title":"Logic for Programming and Automated Reasoning","author":"F. Jacquemard","year":"2000","unstructured":"Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Parigot, M., Voronkov, A. (eds.) LPAR 2000. LNCS, vol.\u00a01955, pp. 131\u2013160. Springer, Heidelberg (2000)"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Johnson, D., Perkins, C., Arkko, J.: RFC3775 \u2013 Mobility Support in IPv6 (June 2004)","DOI":"10.17487\/rfc3775"},{"key":"6_CR48","first-page":"31","volume-title":"Proceedings of CSFW 1997","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of CSFW 1997, pp. 31\u201343. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"1","key":"6_CR49","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3233\/JCS-1998-61-204","volume":"6","author":"G. Lowe","year":"1998","unstructured":"Lowe, G.: Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security\u00a06(1), 53\u201384 (1998)","journal-title":"Journal of Computer Security"},{"issue":"1","key":"6_CR50","doi-asserted-by":"publisher","first-page":"55","DOI":"10.3233\/JCS-1996-4104","volume":"4","author":"U.M. Maurer","year":"1996","unstructured":"Maurer, U.M., Schmid, P.E.: A calculus for security bootstrapping in distributed systems. Journal of Computer Security\u00a04(1), 55\u201380 (1996)","journal-title":"Journal of Computer Security"},{"issue":"2","key":"6_CR51","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"6_CR52","unstructured":"Millen, J.K., Muller, F.: Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI International (2001)"},{"key":"6_CR53","first-page":"166","volume-title":"Proceedings of CCS 2001","author":"J.K. Millen","year":"2001","unstructured":"Millen, J.K., Shmatikov, V.: Constraint Solving for Bounded-Process Cryptographic Protocol Analysis. In: Proceedings of CCS 2001, pp. 166\u2013175. ACM Press, New York (2001)"},{"key":"6_CR54","unstructured":"M\u00f6dersheim, S.: Models and Methods for the Automated Analysis of Security Protocols. PhD Thesis, ETH Zurich (2007)"},{"issue":"2-4","key":"6_CR55","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1016\/j.ic.2007.07.006","volume":"206","author":"S. M\u00f6dersheim","year":"2008","unstructured":"M\u00f6dersheim, S.: On the Relationships between Models in Protocol Verification. Information and Computation\u00a0206(2-4), 291\u2013311 (2008)","journal-title":"Information and Computation"},{"key":"#cr-split#-6_CR56.1","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S.: Algebraic Properties in Alice and Bob Notation. In: Proceedings of Ares 2009, pp. 433-440. IEEE Xplore (2009)","DOI":"10.1109\/ARES.2009.95"},{"key":"#cr-split#-6_CR56.2","unstructured":"Extended version: Technical Report RZ3709, IBM Zurich Research Lab (2008),     domino.research.ibm.com\/library\/cyberdig.nsf"},{"key":"6_CR57","doi-asserted-by":"crossref","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L.: Secure Pseudonymous Channels. In: Proceedings of Esorics 2009 (to appear, 2009); Extended version: Technical Report RZ3724, IBM Zurich Research Lab (2009), \n                      \n                        domino.research.ibm.com\/library\/cyberdig.nsf","DOI":"10.1007\/978-3-642-04444-1_21"},{"key":"6_CR58","unstructured":"M\u00f6dersheim, S., Vigan\u00f2, L., Basin, D.: Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. Journal of Computer Security (to appear)"},{"issue":"1","key":"6_CR59","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security\u00a06(1), 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"6_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/BFb0028727","volume-title":"Computer Aided Verification","author":"D. Peled","year":"1998","unstructured":"Peled, D.: Ten Years of Partial Order Reduction. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.\u00a01427, pp. 17\u201328. Springer, Heidelberg (1998)"},{"key":"6_CR61","volume-title":"Modelling and Analysis of Security Protocols","author":"P. Ryan","year":"2000","unstructured":"Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2000)"},{"key":"6_CR62","unstructured":"The Strand Space Method, \n                      \n                        http:\/\/www.mitre.org\/tech\/strands\/"},{"key":"6_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/11805618_21","volume-title":"Term Rewriting and Applications","author":"M. Turuani","year":"2006","unstructured":"Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.\u00a04098, pp. 277\u2013286. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design V"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03829-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T12:11:09Z","timestamp":1558267869000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03829-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642038280","9783642038297"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03829-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}