{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:13:19Z","timestamp":1739509999693,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642103728"},{"type":"electronic","value":"9783642103735"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10373-5_6","type":"book-chapter","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T11:45:27Z","timestamp":1258371927000},"page":"107-126","source":"Crossref","is-referenced-by-count":5,"title":["Improving Automatic Verification of Security Protocols with XOR"],"prefix":"10.1007","author":[{"given":"Xihui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Ton","family":"van Deursen","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Pang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, Springer, Heidelberg (1996)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/CSFW.2001.930138","volume-title":"Proc. 14th IEEE Computer Security Foundations Workshop","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE Computer Society, Los Alamitos (2001)"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-02002-5_5","volume-title":"Formal to Practical Security","author":"C. Cremers","year":"2009","unstructured":"Cremers, C., Lafourcade, P., Nadeau, P.: Comparing state spaces in automatic protocol analysis. In: Formal to Practical Security. LNCS, vol.\u00a05458, pp. 70\u201394. Springer, Heidelberg (2009)"},{"issue":"1","key":"6_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-2006-14101","volume":"14","author":"V. Cortier","year":"2006","unstructured":"Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security\u00a014(1), 1\u201343 (2006)","journal-title":"Journal of Computer Security"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/LICS.2003.1210067","volume-title":"Proc. 8th Annual IEEE Symposium on Logic in Computer Science","author":"H. Comon-Lundh","year":"2003","unstructured":"Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In: Proc. 8th Annual IEEE Symposium on Logic in Computer Science, pp. 271\u2013280. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1007\/978-3-540-32033-3_22","volume-title":"Term Rewriting and Applications","author":"H. Comon-Lundh","year":"2005","unstructured":"Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol.\u00a03467, pp. 294\u2013307. Springer, Heidelberg (2005)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1007\/978-3-540-71209-1_42","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"V. Cortier","year":"2007","unstructured":"Cortier, V., Keighren, G., Steel, G.: Automatic analysis of the security of XOR-based key management schemes. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 538\u2013552. Springer, Heidelberg (2007)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/CSFW.1997.596779","volume-title":"Proc. 10th Computer Security Foundations Workshop","author":"G. Lowe","year":"1997","unstructured":"Lowe, G.: Casper: A compiler for the analysis of security protocols. In: Proc. 10th Computer Security Foundations Workshop, pp. 18\u201330. IEEE Computer Society Press, Los Alamitos (1997)"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/1455770.1455788","volume-title":"Proc. 15th ACM Conference on Computer and Communications Security","author":"R. K\u00fcsters","year":"2008","unstructured":"K\u00fcsters, R., Truderung, T.: Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. In: Proc. 15th ACM Conference on Computer and Communications Security, pp. 129\u2013138. ACM Press, New York (2008)"},{"issue":"4","key":"6_CR11","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","volume":"17","author":"B. Blanchet","year":"2009","unstructured":"Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security\u00a017(4), 363\u2013434 (2009)","journal-title":"Journal of Computer Security"},{"issue":"12","key":"6_CR12","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"issue":"1-3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.scico.2003.12.002","volume":"50","author":"H. Comon-Lundh","year":"2004","unstructured":"Comon-Lundh, H., Cortier, V.: Security properties: two agents are sufficient. Science of Computer Programming\u00a050(1-3), 51\u201371 (2004)","journal-title":"Science of Computer Programming"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Chen, X., van Deursen, T., Pang, J.: Improving automatic verification of protocols with XOR (implementation) (2009), http:\/\/satoss.uni.lu\/software\/","DOI":"10.1007\/978-3-642-10373-5_6"},{"key":"6_CR15","unstructured":"International Business Machines Corporation: CCA basic services reference and guide (2003), http:\/\/www-306.ibm.com\/security\/cryptocards\/pdfs\/CCA_Basic_Services_241_Revised_20030918.pdf"},{"key":"6_CR16","unstructured":"Millen, J.K.: A necessarily parallel attack. In: Proc. Workshop on Formal Methods and Security Protocols (1999)"},{"key":"6_CR17","unstructured":"Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Proc. Symposium on Cryptography and Information Security (2006)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1145\/1352533.1352556","volume-title":"Proc. 2nd ACM Conference on Wireless Network Security","author":"B. Song","year":"2008","unstructured":"Song, B., Mitchell, C.J.: RFID authentication protocol for low-cost tags. In: Proc. 2nd ACM Conference on Wireless Network Security, pp. 140\u2013147. ACM Press, New York (2008)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-03944-7_4","volume-title":"Proc. 3rd Workshop in Information Security Theory and Practices: Smart Devices, Pervasive Systems, and Ubiquitous Networks","author":"T. Deursen van","year":"2009","unstructured":"van Deursen, T., Radomirovi\u0107, S.: Algebraic attacks on RFID protocols. In: Jaap-Henk, H. (ed.) WISTP 2009. LNCS, vol.\u00a05746, pp. 38\u201351. Springer, Heidelberg (2009)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Choi, E.Y., Lee, D.H., Lim, J.I.: Anti-cloning protocol suitable to EPCglobal class-1 generation-2 RFID systems. Computer Standards & Interfaces (in press, 2009)","DOI":"10.1016\/j.csi.2008.12.002"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Cai, Q., Zhan, Y., Wang, Y.: A minimalist mutual authentication protocol for RFID system and BAN logic analysis. In: Proc. ISECS Colloquium on Computing, Communication, Control and Management, pp. 449\u2013453 (2008)","DOI":"10.1109\/CCCM.2008.305"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Burmester, M., Medeiros, B., Munilla, J., Peinado, A.: Secure EPC gen2 compliant radio frequency identification (2009), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-04383-3_17"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1109\/CSF.2009.17","volume-title":"Proc. 22th IEEE Computer Security Foundations Symposium","author":"R. K\u00fcsters","year":"2009","unstructured":"K\u00fcsters, R., Truderung, T.: Using ProVerif to analyze protocols with Diffie-Hellman exponentiation. In: Proc. 22th IEEE Computer Security Foundations Symposium, pp. 157\u2013171. IEEE Computer Society, Los Alamitos (2009)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10373-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T07:23:02Z","timestamp":1739431382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10373-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642103728","9783642103735"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10373-5_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}