{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:13:35Z","timestamp":1739510015057,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642103728"},{"type":"electronic","value":"9783642103735"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10373-5_7","type":"book-chapter","created":{"date-parts":[[2009,11,16]],"date-time":"2009-11-16T11:45:27Z","timestamp":1258371927000},"page":"127-146","source":"Crossref","is-referenced-by-count":4,"title":["Modeling and Verification of Privacy Enhancing Protocols"],"prefix":"10.1007","author":[{"given":"Suriadi","family":"Suriadi","sequence":"first","affiliation":[]},{"given":"Chun","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Ernest","family":"Foo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Holtzman, D.H.: Privacy Lost. Jossey-Bass (2006)"},{"key":"7_CR2","unstructured":"WP 14.1: PRIME (Privacy and Identity Management for Europe) - Framework V3 (March 2008)"},{"key":"7_CR3","unstructured":"Team, T.A.: AVISPA v1.1 User Manual. Information Society Technologies Programme (June 2006), http:\/\/avispa-project.org\/"},{"issue":"3","key":"7_CR4","first-page":"201","volume":"12","author":"I. Al-Azzoni","year":"2005","unstructured":"Al-Azzoni, I., Down, D.G., Khedri, R.: Modeling and verification of cryptographic protocols using coloured petri nets and design\/cpn. Nordic Journal of Computing\u00a012(3), 201\u2013228 (2005)","journal-title":"Nordic Journal of Computing"},{"issue":"3","key":"7_CR5","doi-asserted-by":"crossref","first-page":"347","DOI":"10.3233\/JCS-2005-13302","volume":"13","author":"C. Bodei","year":"2005","unstructured":"Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. J. Comput. Secur.\u00a013(3), 347\u2013390 (2005)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00145-005-0432-z","volume":"20","author":"N. Koblitz","year":"2007","unstructured":"Koblitz, N., Menezes, A.: Another look at provable security. J. Cryptology\u00a020(1), 3\u201337 (2007)","journal-title":"J. Cryptology"},{"key":"7_CR7","series-title":"Monographs in Theoretical Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-60794-3","volume-title":"Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use","author":"K. Jensen","year":"1997","unstructured":"Jensen, K.: Coloured Petri Nets - Basic Concepts, Analysis Methods and Practical Use, 2nd edn. Monographs in Theoretical Computer Science, vol.\u00a01. Springer, Berlin (1997)","edition":"2"},{"issue":"4","key":"7_CR8","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1109\/5.24143","volume":"77","author":"T. Murata","year":"1989","unstructured":"Murata, T.: Petri nets: Properties, analysis and applications. Proceedings of the IEEE\u00a077(4), 541\u2013580 (1989)","journal-title":"Proceedings of the IEEE"},{"key":"7_CR9","unstructured":"Gilmore, S.: Programming in standard ml 1997: A tutorial introduction. Technical report, The University of Edinburgh (1997)"},{"issue":"3-4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s10009-007-0038-x","volume":"9","author":"K. Jensen","year":"2007","unstructured":"Jensen, K., Kristensen, L.M., Wells, L.: Coloured petri nets and cpn tools for modelling and validation of concurrent systems. STTT\u00a09(3-4), 213\u2013254 (2007)","journal-title":"STTT"},{"key":"7_CR11","unstructured":"Suriadi, S., Foo, E., Smith, J.: Private information escrow bound to multiple conditions. Technical report, Information Security Institute - Queensland University of Technology (2008), http:\/\/eprints.qut.edu.au\/17763\/1\/c17763.pdf"},{"issue":"2","key":"7_CR12","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.jnca.2008.02.016","volume":"32","author":"S. Suriadi","year":"2009","unstructured":"Suriadi, S., Foo, E., Josang, A.: A user-centric federated single sign-on system. Journal of Network and Computer Applications\u00a032(2), 388\u2013401 (2009)","journal-title":"Journal of Network and Computer Applications"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-85735-8_18","volume-title":"Trust, Privacy and Security in Digital Business","author":"S. Suriadi","year":"2008","unstructured":"Suriadi, S., Foo, E., Smith, J.: A user-centric protocol for conditional anonymity revocation. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol.\u00a05185, pp. 185\u2013194. Springer, Heidelberg (2008)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Suriadi, S., Ouyang, C., Smith, J., Foo, E.: Modeling and verification of privacy enhancing security protocols. Technical report, ISI, Queensland University of Technology (April 2009) http:\/\/eprints.qut.edu.au\/20088\/ .","DOI":"10.1007\/978-3-642-10373-5_7"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1145\/1352592.1352625","volume-title":"EuroSys","author":"J.M. McCune","year":"2008","unstructured":"McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In: Sventek, J.S., Hand, S. (eds.) EuroSys, pp. 315\u2013328. ACM, New York (2008)"},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"7_CR17","unstructured":"van der Aalst, W.: Pi calculus versus petri nets: Let us eat humble pie rather than further inflate the pi hype. In: BPTrends, pp. 1\u201311 (May 2005)"},{"key":"7_CR18","unstructured":"Christensen, S., Mortensen, K.H.: Design\/CPN ASK-CTL Manual - Version 0.9. University of Aarhus, Aarhus C, Denmark (1996)"},{"issue":"1","key":"7_CR19","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst.\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"7_CR20","first-page":"237","volume-title":"DISCEX 2000","author":"C. Meadows","year":"2000","unstructured":"Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: DISCEX 2000, pp. 237\u2013250. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"issue":"2-3","key":"7_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.tcs.2004.07.036","volume":"335","author":"J.C.M. Baeten","year":"2005","unstructured":"Baeten, J.C.M.: A brief history of process algebra. Theor. Comput. Sci.\u00a0335(2-3), 131\u2013146 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"7_CR23","volume-title":"Communicating and Mobile Systems: the Pi-Calculus","author":"R. Milner","year":"1999","unstructured":"Milner, R.: Communicating and Mobile Systems: the Pi-Calculus. Cambridge University Press, Cambridge (1999)"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J. Cremers","year":"2008","unstructured":"Cremers, C.J.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008)"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, pp. 82\u201396 (June 2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"7_CR26","series-title":"Lecture Notes in Computer Science","first-page":"324","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Tatebayashi","year":"1989","unstructured":"Tatebayashi, M., Matsuzaki, N., Newman Jr., D.B.: Key distribution protocol for digital mobile communication systems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 324\u2013334. Springer, Heidelberg (1989)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10373-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T07:23:20Z","timestamp":1739431400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10373-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642103728","9783642103735"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10373-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}