{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T12:05:44Z","timestamp":1744805144223},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642114854"},{"type":"electronic","value":"9783642114861"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11486-1_24","type":"book-chapter","created":{"date-parts":[[2010,1,27]],"date-time":"2010-01-27T03:39:51Z","timestamp":1264563591000},"page":"282-293","source":"Crossref","is-referenced-by-count":7,"title":["Cryptographic Protocols Analysis in Event B"],"prefix":"10.1007","author":[{"given":"Nazim","family":"Benaissa","sequence":"first","affiliation":[]},{"given":"Dominique","family":"M\u00e9ry","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"24_CR1","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"key":"24_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511624162","volume-title":"The B Book - Assigning Programs to Meanings","author":"J. Abrial","year":"1996","unstructured":"Abrial, J.: The B Book - Assigning Programs to Meanings. Cambridge University Press, Cambridge (1996)"},{"key":"24_CR3","first-page":"33","volume-title":"The event-B Modelling Method: Concepts and Case Studies [15]","author":"D. Cansell","year":"2007","unstructured":"Cansell, D., M\u00e9ry, D.: The event-B Modelling Method: Concepts and Case Studies [15], pp. 33\u2013140. Springer, Heidelberg (2007)"},{"issue":"12","key":"24_CR4","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/BFb0028166","volume-title":"Security Protocols","author":"S. Blake-Wilson","year":"1998","unstructured":"Blake-Wilson, S., Menezes, A.: Entity authentication and authenticated key transport protocols employing asymmetric techniques. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 137\u2013158. Springer, Heidelberg (1998)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/3-540-61042-1_43","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol.\u00a01055, pp. 147\u2013166. Springer, Heidelberg (1996)"},{"key":"24_CR7","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3233\/JCS-1998-61-205","volume":"6","author":"L.C. Paulson","year":"1998","unstructured":"Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security\u00a06, 85\u2013128 (1998)","journal-title":"Journal of Computer Security"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Isabelle - A Generic Theorem Prover (with a contribution by T. Nipkow)","year":"1994","unstructured":"Paulson, L.C. (ed.): Isabelle. LNCS, vol.\u00a0828. Springer, Heidelberg (1994)"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/BFb0028735","volume-title":"Computer Aided Verification","author":"D. Bolignano","year":"1998","unstructured":"Bolignano, D.: Integrating proof-based and model-checking techniques for the formal verification of cryptographic protocols. In: Hu, A.J., Vardi, M.Y. (eds.) CAV 1998. LNCS, vol.\u00a01427, pp. 77\u201387. Springer, Heidelberg (1998)"},{"key":"24_CR10","unstructured":"Stepney, S., Cooper, D., Woodcock, J.: An electronic purse: Specification, refinement, and proof. Technical monograph PRG-126, Oxford University Computing Laboratory (July 2000)"},{"issue":"1-2","key":"24_CR11","first-page":"1","volume":"77","author":"J.R. Abrial","year":"2007","unstructured":"Abrial, J.R., Hallerstede, S.: Refinement, decomposition, and instantiation of discrete models: Application to event-b. Fundamenta Informaticae\u00a077(1-2), 1\u201328 (2007)","journal-title":"Fundamenta Informaticae"},{"key":"24_CR12","unstructured":"Rodin, P.: The rodin project: Rigorous open development environment for complex systems (2006), \n                    \n                      http:\/\/rodin-b-sharp.sourceforge.net\/"},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/0022-0000(81)90005-2","volume":"23","author":"R.J.R. Back","year":"1979","unstructured":"Back, R.J.R.: On correct refinement of programs. Journal of Computer and System Sciences\u00a023(1), 49\u201368 (1979)","journal-title":"Journal of Computer and System Sciences"},{"key":"24_CR14","series-title":"Graduate Texts in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1674-2","volume-title":"Refinement Calculus A Systematic Introduction","author":"R.J. Back","year":"1998","unstructured":"Back, R.J., von Wright, J.: Refinement Calculus A Systematic Introduction. Graduate Texts in Computer Science. Springer, Heidelberg (1998)"},{"key":"24_CR15","series-title":"EATCS Textbook in Computer Science","volume-title":"Logics of Specification Languages","year":"2007","unstructured":"Bj\u00f8rner, D., Henson, M.C. (eds.): Logics of Specification Languages. EATCS Textbook in Computer Science. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Perspectives of Systems Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11486-1_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:52:48Z","timestamp":1619769168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11486-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642114854","9783642114861"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11486-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}