{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:22:26Z","timestamp":1725556946846},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642134630"},{"type":"electronic","value":"9783642134647"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13464-7_16","type":"book-chapter","created":{"date-parts":[[2010,6,7]],"date-time":"2010-06-07T10:50:49Z","timestamp":1275907849000},"page":"201-215","source":"Crossref","is-referenced-by-count":4,"title":["On-the-Fly Trace Generation and Textual Trace Analysis and Their Applications to the Analysis of Cryptographic Protocols"],"prefix":"10.1007","author":[{"given":"Yongyuth","family":"Permpoontanalarp","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Clark, J., Jacob, J.: A survey on Authentication Protocols, Research report, University of York (1997), \n                    \n                      http:\/\/www.cs.york.ac.uk\/~jac\/papers\/drareview.ps.gz"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/JSAC.2002.806125","volume":"21","author":"C. Meadows","year":"2003","unstructured":"Meadows, C.: Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communications\u00a021(1), 44\u201354 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Meyer, U., Wetzel, S.: A man-in-the-middle attack on UMTS. In: The 3rd ACM workshop on Wireless Security, pp. 90\u201397 (2004)","DOI":"10.1145\/1023646.1023662"},{"issue":"2-4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/j.ic.2007.05.005","volume":"206","author":"I. Cervesato","year":"2008","unstructured":"Cervesato, I., Jaggard, A.D., Scedrov, A., Tsay, J., Walstad, C.: Breaking and fixing public-key Kerberos. Information and Computation\u00a0206(2-4), 402\u2013424 (2008)","journal-title":"Information and Computation"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Syverson, P.F.: A Taxonomy of Replay Attacks. In: The 7th IEEE Computer Security Foundations Workshop, pp. 187\u2013191 (1994)","DOI":"10.1109\/CSFW.1994.315935"},{"key":"16_CR6","unstructured":"The AVISPA project, \n                    \n                      http:\/\/avispa-project.org"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2005.11.052","volume":"155","author":"L. Vigan\u00f2","year":"2006","unstructured":"Vigan\u00f2, L.: Automated Security Protocol Analysis With the AVISPA Tool. Electr. Notes Theor. Comput. Sci.\u00a0155, 61\u201386 (2006)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-46017-9_14","volume-title":"Model Checking Software","author":"P. Maggi","year":"2002","unstructured":"Maggi, P., Sisto, R.: Using SPIN to Verify Security Properties of Cryptographic Protocols. In: Bo\u0161na\u010dki, D., Leue, S. (eds.) SPIN 2002. LNCS, vol.\u00a02318, pp. 85\u201387. Springer, Heidelberg (2002)"},{"issue":"10","key":"16_CR9","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/32.637148","volume":"23","author":"G. Lowe","year":"1997","unstructured":"Lowe, G., Roscoe, B.: Using CSP to Detect Errors in the TMN Protocol. IEEE Transactions on Software Engineering\u00a023(10), 659\u2013669 (1997)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"16_CR10","first-page":"93","volume":"17","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Software - Concepts and Tools\u00a017(3), 93\u2013102 (1996)","journal-title":"Software - Concepts and Tools"},{"key":"16_CR11","unstructured":"Mitchell, J., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using Mur\u03c6. In: 1997 IEEE Symposium on Security and privacy, pp. 141\u2013151 (1997)"},{"issue":"2","key":"16_CR12","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/S0304-3975(01)00141-4","volume":"283","author":"V. Shmatikov","year":"2002","unstructured":"Shmatikov, V., Mitchell, J.C.: Finite-state analysis of two contract signing protocols. Theor. Comput. Sci.\u00a0283(2), 419\u2013450 (2002)","journal-title":"Theor. Comput. Sci."},{"issue":"3","key":"16_CR13","first-page":"201","volume":"12","author":"I. Al-Azzoni","year":"2005","unstructured":"Al-Azzoni, I., Down, D.G., Khedri, R.: Modeling and Verification of Cryptographic Protocols Using Coloured Petri Nets and Design\/CPN. Nordic Journal of Computing\u00a012(3), 201\u2013228 (2005)","journal-title":"Nordic Journal of Computing"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-540-68746-7_9","volume-title":"Applications and Theory of Petri Nets","author":"R. Bouroulet","year":"2008","unstructured":"Bouroulet, R., Devillers, R., Klaudel, H., Pelz, E., Pommereau, F.: Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets. In: van Hee, K.M., Valk, R. (eds.) PETRI NETS 2008. LNCS, vol.\u00a05062, pp. 72\u201391. Springer, Heidelberg (2008)"},{"issue":"2","key":"16_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/0743-1066(95)00095-X","volume":"26","author":"C. Meadows","year":"1996","unstructured":"Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming\u00a026(2), 113\u2013131 (1996)","journal-title":"Journal of Logic Programming"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/CSFW.2001.930138","volume-title":"14th IEEE Computer Security Foundations Workshop","author":"B. Blanchet","year":"2001","unstructured":"Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82\u201396. IEEE press, Los Alamitos (2001)"},{"key":"16_CR17","first-page":"12","volume-title":"21st Symposium on Principles of Distributed Computing","author":"S. Micali","year":"2003","unstructured":"Micali, S.: Simple and Fast Optimistic Protocols for Fair Electronics Exchange. In: 21st Symposium on Principles of Distributed Computing, pp. 12\u201319. ACM Press, New York (2003)"},{"key":"16_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/0-387-34805-0_30","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"M. Tatebayashi","year":"1990","unstructured":"Tatebayashi, M., Matsuzaki, N., Newman, D.: Key Distribution Protocol for Digital Mobile Communication Systems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 324\u2013334. Springer, Heidelberg (1990)"},{"key":"16_CR19","series-title":"Monographs in Theoretical Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-60794-3","volume-title":"Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use","author":"K. Jensen","year":"1997","unstructured":"Jensen, K.: Coloured Petri Nets. Basic Concepts, Analysis Methods and Practical Use. Monographs in Theoretical Computer Science, vol.\u00a01. Springer, Heidelberg (1997)"},{"key":"16_CR20","unstructured":"CPNTools, \n                    \n                      http:\/\/wiki.daimi.au.dk\/cpntools\/"},{"key":"16_CR21","first-page":"329","volume-title":"The 9th ACIS-SNPD 2008","author":"P. Sornkhom","year":"2008","unstructured":"Sornkhom, P., Permpoontanalarp, Y.: Security Analysis of Micali\u2019s Fair Contract Signing Protocol by Using Coloured Petri Nets. In: The 9th ACIS-SNPD 2008, pp. 329\u2013334. IEEE Press, Thailand (2008)"},{"key":"16_CR22","first-page":"1","volume-title":"The 5th International Workshop on Security in Systems and Networks","author":"P. Sornkhom","year":"2009","unstructured":"Sornkhom, P., Permpoontanalarp, Y.: Security Analysis of Micali\u2019s Fair Contract Signing Protocol by Using Coloured Petri Nets: Multi-session case. In: The 5th International Workshop on Security in Systems and Networks, pp. 1\u20138. IEEE press, Italy (2009)"},{"key":"16_CR23","unstructured":"Permpoontanalarp, Y., Sornkhom, P.: A New Coloured Petri Net Methodology for the Security Analysis of Cryptographic Protocols. In: The 10th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools, Denmark, pp. 81\u2013100 (2009)"},{"key":"16_CR24","unstructured":"Permpoontanalarp, Y.: Security Analysis of the TMN protocol by using Coloured Petri Nets: Multi-Session Case. In: The 10th International Conference on Intelligent Technologies, China, pp. 401\u2013410 (2009)"},{"key":"16_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-27800-9_16","volume-title":"Information Security and Privacy","author":"F. Bao","year":"2004","unstructured":"Bao, F., Wang, G., Zhou, J., Zhu, Z.: Analysis and Improvement of Micali\u2019s Fair Contract Signing Protocol. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 176\u2013187. Springer, Heidelberg (2004)"},{"key":"16_CR26","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/11596981_20","volume-title":"Computational Intelligence and Security","author":"Y. Zhang","year":"2005","unstructured":"Zhang, Y., Wang, Z., Yang, B.: The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol.\u00a03802, pp. 137\u2013142. Springer, Heidelberg (2005)"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Kemmerer, R., Meadows, C., Millen, J.: Three systems for cryptographic protocol analysis. Journal of Cryptology\u00a07(2) (1994)","DOI":"10.1007\/BF00197942"},{"key":"16_CR28","series-title":"The Inter-National Series in Engineering and Computer Science","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/b105342","volume-title":"Progress on Cryptography: 25 years of Cryptography in China","author":"Y. Zhang","year":"2004","unstructured":"Zhang, Y., Liu, X.: An approach to the formal analysis of TMN protocol. In: Chen, K. (ed.) Progress on Cryptography: 25 years of Cryptography in China. The Inter-National Series in Engineering and Computer Science, vol.\u00a0769, pp. 235\u2013243. Springer, Netherlands (2004)"},{"issue":"2","key":"16_CR29","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013207 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"16_CR30","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G. Lowe","year":"1995","unstructured":"Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters\u00a056(3), 131\u2013133 (1995)","journal-title":"Information Processing Letters"},{"key":"16_CR31","unstructured":"ITU-T, Recommendation Z.120: Message Sequence Chart (MSC), ITU-T, Geneva (1996)"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13464-7_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:04:16Z","timestamp":1619784256000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13464-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642134630","9783642134647"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13464-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}